FS#67858 : [security] [openssl-1.0] CVE-2020-1968

Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines

Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.

REPEAT: Do NOT report bugs for outdated packages!

Tasklist

Task Type Bug Report
Category Security
Status Closed
Assigned To Pierre Schmitz (Pierre)
Levente Polyak (anthraxx)
Architecture All
Severity High
Priority Normal
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 2
Private No

Details

Description:
A Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection.

Additional info:
* openssl-1.0 1.0.2.u-1
* https://www.openssl.org/news/secadv/20200909.txt

Closed by  Toolybird (Toolybird)
Monday, 20 March 2023, 18:47 GMT
Reason for closing:  Won't fix
Additional comments about closing:  @TrialnError says "In december 2022 the package in question was dropped to AUR"
https://aur.archlinux.org/packages/opens sl-1.0#comment-906951

Loading...