[Midnightbsd-cvs] src [8596] trunk/UPDATING: update patchset

laffer1 at midnightbsd.org laffer1 at midnightbsd.org
Fri Sep 23 13:51:12 EDT 2016


Revision: 8596
          http://svnweb.midnightbsd.org/src/?rev=8596
Author:   laffer1
Date:     2016-09-23 13:51:12 -0400 (Fri, 23 Sep 2016)
Log Message:
-----------
update patchset

Modified Paths:
--------------
    trunk/UPDATING

Modified: trunk/UPDATING
===================================================================
--- trunk/UPDATING	2016-09-23 17:48:44 UTC (rev 8595)
+++ trunk/UPDATING	2016-09-23 17:51:12 UTC (rev 8596)
@@ -1,5 +1,65 @@
 Updating Information for MidnightBSD users.
 
+20160923:
+	Security update for OpenSSL
+
+	A malicious client can send an excessively large OCSP Status Request extension.
+	If that client continually requests renegotiation, sending a large OCSP Status
+	Request extension each time, then there will be unbounded memory growth on the
+	server. [CVE-2016-6304]
+
+	An overflow can occur in MDC2_Update() either if called directly or through
+	the EVP_DigestUpdate() function using MDC2. If an attacker is able to supply
+	very large amounts of input data after a previous call to EVP_EncryptUpdate()
+	with a partial block then a length check can overflow resulting in a heap
+	corruption. [CVE-2016-6303]
+
+	If a server uses SHA512 for TLS session ticket HMAC it is vulnerable to a
+	DoS attack where a malformed ticket will result in an OOB read which will
+	ultimately crash. [CVE-2016-6302]
+
+	The function BN_bn2dec() does not check the return value of BN_div_word().
+	This can cause an OOB write if an application uses this function with an
+	overly large BIGNUM. This could be a problem if an overly large certificate
+	or CRL is printed out from an untrusted source. TLS is not affected because
+	record limits will reject an oversized certificate before it is parsed.
+	[CVE-2016-2182]
+
+	The function TS_OBJ_print_bio() misuses OBJ_obj2txt(): the return value is
+	the total length the OID text representation would use and not the amount
+	of data written. This will result in OOB reads when large OIDs are presented.
+	[CVE-2016-2180]
+
+	Some calculations of limits in OpenSSL have used undefined pointer arithmetic. 
+	This could cause problems with some malloc implementations. [CVE-2016-2177]
+
+	Operations in the DSA signing algorithm should run in constant time in order to
+	avoid side channel attacks. A flaw in the OpenSSL DSA implementation means that
+	a non-constant time codepath is followed for certain operations. [CVE-2016-2178]
+
+	In a DTLS connection where handshake messages are delivered out-of-order those
+	messages that OpenSSL is not yet ready to process will be buffered for later
+	use. Under certain circumstances, a flaw in the logic means that those messages
+	do not get removed from the buffer even though the handshake has been completed.
+	An attacker could force up to approx. 15 messages to remain in the buffer when
+	they are no longer required. These messages will be cleared when the DTLS
+	connection is closed. The default maximum size for a message is 100k. Therefore
+	the attacker could force an additional 1500k to be consumed per connection.
+	[CVE-2016-2179]
+
+	A flaw in the DTLS replay attack protection mechanism means that records that
+	arrive for future epochs update the replay protection "window" before the MAC
+	for the record has been validated. This could be exploited by an attacker by
+	sending a record for the next epoch (which does not have to decrypt or have a
+	valid MAC), with a very large sequence number. This means that all subsequent
+	legitimate packets are dropped causing a denial of service for a specific
+	DTLS connection. [CVE-2016-2181]
+
+	In OpenSSL 1.0.2 and earlier some missing message length checks can result in
+	OOB reads of up to 2 bytes beyond an allocated buffer. There is a theoretical
+	DoS risk but this has not been observed in practice on common platforms.
+	[CVE-2016-6306]
+
 20160918:
 	With the addition of auditdistd(8), a new auditdistd user is now
 	depended on during installworld.  "mergemaster -p" can be used to add



More information about the Midnightbsd-cvs mailing list