#4523: openssl-1.1.1d
--------------------+-----------------------
 Reporter:  bdubbs  |       Owner:  lfs-book
     Type:  task    |      Status:  new
 Priority:  high    |   Milestone:  9.1
Component:  Book    |     Version:  SVN
 Severity:  normal  |  Resolution:
 Keywords:          |
--------------------+-----------------------
Changes (by bdubbs):

 * priority:  normal => high


Comment:

 Major changes between OpenSSL 1.1.1c and OpenSSL 1.1.1d [10 Sep 2019]

       - Fixed a fork protection issue (CVE-2019-1549)
         - LFS Note:  Base Score: 5.3 MEDIUM; Impact Score: 1.4;
 Exploitability Score: 3.9
       - Fixed a padding oracle in PKCS7_dataDecode and
 CMS_decrypt_set1_pkey
         (CVE-2019-1563)
         -  Base Score: 3.7 LOW; Impact Score: 1.4; Exploitability Score:
 2.2
       - For built-in EC curves, ensure an EC_GROUP built from the curve
 name is
         used even when parsing explicit parameters
       - Compute ECC cofactors if not provided during EC_GROUP construction
         (CVE-2019-1547)
         -  Base Score: 4.7 MEDIUM; Impact Score: 3.6; Exploitability
 Score: 1.0
       - Early start up entropy quality from the DEVRANDOM seed source has
 been
         improved for older Linux systems
       - Correct the extended master secret constant on EBCDIC systems
       - Use Windows installation paths in the mingw builds (CVE-2019-1552)
         - LFS N/A
       - Changed DH_check to accept parameters with order q and 2q
 subgroups
       - Significantly reduce secure memory usage by the randomness pools
       - Revert the DEVRANDOM_WAIT feature for Linux systems

--
Ticket URL: <http://wiki.linuxfromscratch.org/lfs/ticket/4523#comment:3>
LFS Trac <http://wiki.linuxfromscratch.org/lfs/>
Linux From Scratch: Your Distro, Your Rules.
-- 
http://lists.linuxfromscratch.org/listinfo/lfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to