[3.1] openssl: Security issues (CVE-2016-2183, CVE-2016-6304, CVE-2016-6306)
CVE-2016-2183: SWEET32 Mitigation
SWEET32 (https://sweet32.info) is an attack on older block cipher
algorithms
that use a block size of 64 bits. In mitigation for the SWEET32 attack
DES based
ciphersuites have been moved from the HIGH cipherstring group to MEDIUM
in
OpenSSL 1.0.1 and OpenSSL 1.0.2. OpenSSL 1.1.0 since release has had
these
ciphersuites disabled by default.
OpenSSL 1.0.2 users should upgrade to 1.0.2i
OpenSSL 1.0.1 users should upgrade to 1.0.1u
Reference:
https://www.openssl.org/news/secadv/20160922.txt
CVE-2016-6304: OCSP Status Request extension unbounded memory growth
A malicious client can send an excessively large OCSP Status Request
extension.
If that client continually requests renegotiation, sending a large OCSP
Status
Request extension each time, then there will be unbounded memory growth
on the
server.
OpenSSL 1.0.2 users should upgrade to 1.0.2i
OpenSSL 1.0.1 users should upgrade to 1.0.1u
Reference:
https://www.openssl.org/news/secadv/20160922.txt
CVE-2016-6306: Certificate message OOB reads
In OpenSSL 1.0.2 and earlier some missing message length checks can
result in
OOB reads of up to 2 bytes beyond an allocated buffer. There is a
theoretical
DoS risk but this has not been observed in practice on common platforms.
OpenSSL 1.0.2 users should upgrade to 1.0.2i
OpenSSL 1.0.1 users should upgrade to 1.0.1u
Reference:
https://www.openssl.org/news/secadv/20160922.txt
(from redmine: issue id 6210, created on 2016-09-22, closed on 2016-09-22)
- Relations:
- parent #6206 (closed)
- Changesets:
- Revision 3e8e66af by Natanael Copa on 2016-09-22T14:19:05Z:
main/openssl: upgrade to 1.0.1u
fixes #6210