Debian: DSA-3500-1: openssl security update

    Date01 Mar 2016
    CategoryDebian
    72
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities were discovered in OpenSSL, a Secure Socket Layer toolkit. CVE-2016-0702
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3500-1                   security@debian.org
    https://www.debian.org/security/                       Alessandro Ghedini
    March 01, 2016                        https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : openssl
    CVE ID         : CVE-2016-0702 CVE-2016-0705 CVE-2016-0797 CVE-2016-0798
                     CVE-2016-0799
    
    Several vulnerabilities were discovered in OpenSSL, a Secure Socket Layer
    toolkit.
    
    CVE-2016-0702
    
        Yuval Yarom from the University of Adelaide and NICTA, Daniel Genkin
        from Technion and Tel Aviv University, and Nadia Heninger from the
        University of Pennsylvania discovered a side-channel attack which
        makes use of cache-bank conflicts on the Intel Sandy-Bridge
        microarchitecture. This could allow local attackers to recover RSA
        private keys.
    
    CVE-2016-0705
    
        Adam Langley from Google discovered a double free bug when parsing
        malformed DSA private keys. This could allow remote attackers to
        cause a denial of service or memory corruption in applications
        parsing DSA private keys received from untrusted sources.
    
    CVE-2016-0797
    
        Guido Vranken discovered an integer overflow in the BN_hex2bn and
        BN_dec2bn functions that can lead to a NULL pointer dereference and
        heap corruption. This could allow remote attackers to cause a denial
        of service or memory corruption in applications processing hex or
        dec data received from untrusted sources.
    
    CVE-2016-0798
    
        Emilia Käsper of the OpenSSL development team discovered a memory
        leak in the SRP database lookup code. To mitigate the memory leak,
        the seed handling in SRP_VBASE_get_by_user is now disabled even if
        the user has configured a seed. Applications are advised to migrate
        to the SRP_VBASE_get1_by_user function.
    
    CVE-2016-0799
    
        Guido Vranken discovered an integer overflow in the BIO_*printf
        functions that could lead to an OOB read when printing very long
        strings. Additionally the internal doapr_outch function can attempt
        to write to an arbitrary memory location in the event of a memory
        allocation failure. These issues will only occur on platforms where
        sizeof(size_t) > sizeof(int) like many 64 bit systems. This could
        allow remote attackers to cause a denial of service or memory
        corruption in applications that pass large amounts of untrusted data
        to the BIO_*printf functions.
    
    Additionally the EXPORT and LOW ciphers were disabled since thay could
    be used as part of the DROWN (CVE-2016-0800) and SLOTH (CVE-2015-7575)
    attacks, but note that the oldstable (wheezye) and stable (jessie)
    distributions are not affected by those attacks since the SSLv2 protocol
    has already been dropped in the openssl package version 1.0.0c-2.
    
    For the oldstable distribution (wheezy), these problems have been fixed
    in version 1.0.1e-2+deb7u20.
    
    For the stable distribution (jessie), these problems have been fixed in
    version 1.0.1k-3+deb8u4.
    
    For the unstable distribution (sid), these problems will be fixed shortly.
    
    We recommend that you upgrade your openssl packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.