Linux Security
    Linux Security
    Linux Security

    Debian: DSA-3673-1: openssl security update

    Date 22 Sep 2016
    Posted By LinuxSecurity Advisories
    Several vulnerabilities were discovered in OpenSSL: CVE-2016-2177
    Hash: SHA1
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3673-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.                       Moritz Muehlenhoff
    September 22, 2016          
    - -------------------------------------------------------------------------
    Package        : openssl
    CVE ID         : CVE-2016-2177 CVE-2016-2178 CVE-2016-2179 CVE-2016-2180 
                     CVE-2016-2181 CVE-2016-2182 CVE-2016-2183 CVE-2016-6302
                     CVE-2016-6303 CVE-2016-6304 CVE-2016-6306
    Several vulnerabilities were discovered in OpenSSL:
        Guido Vranken discovered that OpenSSL uses undefined pointer
        arithmetic. Additional information can be found at    
        Cesar Pereida, Billy Brumley and Yuval Yarom discovered a timing
        leak in the DSA code.
    CVE-2016-2179 / CVE-2016-2181
        Quan Luo and the OCAP audit team discovered denial of service
        vulnerabilities in DTLS.
    CVE-2016-2180 / CVE-2016-2182 / CVE-2016-6303
        Shi Lei discovered an out-of-bounds memory read in
        TS_OBJ_print_bio() and an out-of-bounds write in BN_bn2dec()
        and MDC2_Update().
        DES-based cipher suites are demoted from the HIGH group to MEDIUM
        as a mitigation for the SWEET32 attack.
        Shi Lei discovered that the use of SHA512 in TLS session tickets
        is susceptible to denial of service.
        Shi Lei discovered that excessively large OCSP status request may
        result in denial of service via memory exhaustion.
        Shi Lei discovered that missing message length validation when parsing
        certificates may potentially result in denial of service.
    For the stable distribution (jessie), these problems have been fixed in
    version 1.0.1t-1+deb8u4.
    For the unstable distribution (sid), these problems will be fixed soon.
    We recommend that you upgrade your openssl packages.
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at:
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"8","type":"x","order":"1","pct":27.59,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":20.69,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":51.72,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.