Debian: DSA-3673-1: openssl security update

    Date22 Sep 2016
    CategoryDebian
    38
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities were discovered in OpenSSL: CVE-2016-2177
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3673-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                       Moritz Muehlenhoff
    September 22, 2016                    https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : openssl
    CVE ID         : CVE-2016-2177 CVE-2016-2178 CVE-2016-2179 CVE-2016-2180 
                     CVE-2016-2181 CVE-2016-2182 CVE-2016-2183 CVE-2016-6302
                     CVE-2016-6303 CVE-2016-6304 CVE-2016-6306
    
    Several vulnerabilities were discovered in OpenSSL:
    
    CVE-2016-2177
    
        Guido Vranken discovered that OpenSSL uses undefined pointer
        arithmetic. Additional information can be found at
        https://www.openssl.org/blog/blog/2016/06/27/undefined-pointer-arithmetic/    
    
    CVE-2016-2178
    
        Cesar Pereida, Billy Brumley and Yuval Yarom discovered a timing
        leak in the DSA code.
    
    CVE-2016-2179 / CVE-2016-2181
    
        Quan Luo and the OCAP audit team discovered denial of service
        vulnerabilities in DTLS.
    
    CVE-2016-2180 / CVE-2016-2182 / CVE-2016-6303
    
        Shi Lei discovered an out-of-bounds memory read in
        TS_OBJ_print_bio() and an out-of-bounds write in BN_bn2dec()
        and MDC2_Update().
    
    CVE-2016-2183
    
        DES-based cipher suites are demoted from the HIGH group to MEDIUM
        as a mitigation for the SWEET32 attack.
    
    CVE-2016-6302
    
        Shi Lei discovered that the use of SHA512 in TLS session tickets
        is susceptible to denial of service.
    
    CVE-2016-6304
    
        Shi Lei discovered that excessively large OCSP status request may
        result in denial of service via memory exhaustion.
    
    CVE-2016-6306
    
        Shi Lei discovered that missing message length validation when parsing
        certificates may potentially result in denial of service.
    
    For the stable distribution (jessie), these problems have been fixed in
    version 1.0.1t-1+deb8u4.
    
    For the unstable distribution (sid), these problems will be fixed soon.
    
    We recommend that you upgrade your openssl packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"8","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":21.43,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"3","type":"x","order":"3","pct":21.43,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.