Joined: 12 May 2004
|Posted: Fri Jul 10, 2015 3:26 pm Post subject: [ GLSA 201507-15 ] OpenSSL
|Gentoo Linux Security Advisory
Title: OpenSSL: Alternate chains certificate forgery (GLSA 201507-15)
Date: July 10, 2015
Updated: February 26, 2016
Certain checks on untrusted certificates can be bypassed.
OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer
(SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general
purpose cryptography library.
Vulnerable: < 1.0.1p
Unaffected: >= 1.0.1p
Unaffected: >= 0.9.8z_p6 < 0.9.9
Unaffected: >= 0.9.8z_p7 < 0.9.9
Unaffected: >= 0.9.8z_p8 < 0.9.9
Unaffected: >= 0.9.8z_p9 < 0.9.9
Unaffected: >= 0.9.8z_p10 < 0.9.9
Unaffected: >= 0.9.8z_p11 < 0.9.9
Unaffected: >= 0.9.8z_p12 < 0.9.9
Unaffected: >= 0.9.8z_p13 < 0.9.9
Unaffected: >= 0.9.8z_p14 < 0.9.9
Unaffected: >= 0.9.8z_p15 < 0.9.9
Architectures: All supported architectures
During certificate verification, OpenSSL attempts to find an alternative
certificate chain if the first attempt to build such a chain fails.
A remote attacker could cause certain checks on untrusted
certificates to be bypassed, such as the CA flag, enabling them to use a
valid leaf certificate to act as a CA and “issue” an invalid
There is no known workaround at this time.
All OpenSSL users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.1p"
Last edited by GLSA on Sat Feb 27, 2016 4:16 am; edited 2 times in total