pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: CVS commit: pkgsrc/security/openssl
Thanks! However, 1.0.2c is out there and needs to be used instead...
https://twitter.com/mancha140/status/609386942489178112
-F
> 12. 6. 2015 v 19:02, Matthias Scheler <tron%netbsd.org@localhost>:
>
> Module Name: pkgsrc
> Committed By: tron
> Date: Fri Jun 12 17:02:24 UTC 2015
>
> Modified Files:
> pkgsrc/security/openssl: Makefile PLIST.common distinfo
> pkgsrc/security/openssl/patches: patch-Configure
>
> Log Message:
> Update "openssl" package to version 1.0.2b. Changes since version 1.0.2a:
> - Malformed ECParameters causes infinite loop
> When processing an ECParameters structure OpenSSL enters an infinite loop
> if the curve specified is over a specially malformed binary polynomial
> field.
> This can be used to perform denial of service against any
> system which processes public keys, certificate requests or
> certificates. This includes TLS clients and TLS servers with
> client authentication enabled.
> This issue was reported to OpenSSL by Joseph Barr-Pixton.
> (CVE-2015-1788)
> [Andy Polyakov]
> - Exploitable out-of-bounds read in X509_cmp_time
> X509_cmp_time does not properly check the length of the ASN1_TIME
> string and can read a few bytes out of bounds. In addition,
> X509_cmp_time accepts an arbitrary number of fractional seconds in the
> time string.
> An attacker can use this to craft malformed certificates and CRLs of
> various sizes and potentially cause a segmentation fault, resulting in
> a DoS on applications that verify certificates or CRLs. TLS clients
> that verify CRLs are affected. TLS clients and servers with client
> authentication enabled may be affected if they use custom verification
> callbacks.
> This issue was reported to OpenSSL by Robert Swiecki (Google), and
> independently by Hanno B�ck.
> (CVE-2015-1789)
> [Emilia K�sper]
> - PKCS7 crash with missing EnvelopedContent
> The PKCS#7 parsing code does not handle missing inner EncryptedContent
> correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs
> with missing content and trigger a NULL pointer dereference on parsing.
> Applications that decrypt PKCS#7 data or otherwise parse PKCS#7
> structures from untrusted sources are affected. OpenSSL clients and
> servers are not affected.
> This issue was reported to OpenSSL by Michal Zalewski (Google).
> (CVE-2015-1790)
> [Emilia K�sper]
> - CMS verify infinite loop with unknown hash function
> When verifying a signedData message the CMS code can enter an infinite loop
> if presented with an unknown hash function OID. This can be used to perform
> denial of service against any system which verifies signedData messages using
> the CMS code.
> This issue was reported to OpenSSL by Johannes Bauer.
> (CVE-2015-1792)
> [Stephen Henson]
> - Race condition handling NewSessionTicket
> If a NewSessionTicket is received by a multi-threaded client when
> attempting to reuse a previous ticket then a race condition can occur
> potentially leading to a double free of the ticket data.
> (CVE-2015-1791)
> [Matt Caswell]
> - Removed support for the two export grade static DH ciphersuites
> EXP-DH-RSA-DES-CBC-SHA and EXP-DH-DSS-DES-CBC-SHA. These two ciphersuites
> were newly added (along with a number of other static DH ciphersuites) to
> 1.0.2. However the two export ones have *never* worked since they were
> introduced. It seems strange in any case to be adding new export
> ciphersuites, and given "logjam" it also does not seem correct to fix them.
> [Matt Caswell]
> - Only support 256-bit or stronger elliptic curves with the
> 'ecdh_auto' setting (server) or by default (client). Of supported
> curves, prefer P-256 (both).
> [Emilia Kasper]
> - Reject DH handshakes with parameters shorter than 768 bits.
> [Kurt Roeckx and Emilia Kasper]
>
>
> To generate a diff of this commit:
> cvs rdiff -u -r1.207 -r1.208 pkgsrc/security/openssl/Makefile
> cvs rdiff -u -r1.23 -r1.24 pkgsrc/security/openssl/PLIST.common
> cvs rdiff -u -r1.112 -r1.113 pkgsrc/security/openssl/distinfo
> cvs rdiff -u -r1.4 -r1.5 pkgsrc/security/openssl/patches/patch-Configure
>
> Please note that diffs are not public domain; they are subject to the
> copyright notices on the relevant files.
>
Home |
Main Index |
Thread Index |
Old Index