Skip to content
GitLab
Projects Groups Snippets
  • /
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
  • aports aports
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Graph
    • Compare
  • Issues 660
    • Issues 660
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 335
    • Merge requests 335
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Releases
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • alpinealpine
  • aportsaports
  • Issues
  • #6210
Closed
Open
Issue created Sep 22, 2016 by Alicha CH@alichaReporter

[3.1] openssl: Security issues (CVE-2016-2183, CVE-2016-6304, CVE-2016-6306)

CVE-2016-2183: SWEET32 Mitigation

SWEET32 (https://sweet32.info) is an attack on older block cipher algorithms
that use a block size of 64 bits. In mitigation for the SWEET32 attack DES based
ciphersuites have been moved from the HIGH cipherstring group to MEDIUM in
OpenSSL 1.0.1 and OpenSSL 1.0.2. OpenSSL 1.1.0 since release has had these
ciphersuites disabled by default.

OpenSSL 1.0.2 users should upgrade to 1.0.2i
OpenSSL 1.0.1 users should upgrade to 1.0.1u

Reference:

https://www.openssl.org/news/secadv/20160922.txt

CVE-2016-6304: OCSP Status Request extension unbounded memory growth

A malicious client can send an excessively large OCSP Status Request extension.
If that client continually requests renegotiation, sending a large OCSP Status
Request extension each time, then there will be unbounded memory growth on the
server.

OpenSSL 1.0.2 users should upgrade to 1.0.2i
OpenSSL 1.0.1 users should upgrade to 1.0.1u

Reference:

https://www.openssl.org/news/secadv/20160922.txt

CVE-2016-6306: Certificate message OOB reads

In OpenSSL 1.0.2 and earlier some missing message length checks can result in
OOB reads of up to 2 bytes beyond an allocated buffer. There is a theoretical
DoS risk but this has not been observed in practice on common platforms.

OpenSSL 1.0.2 users should upgrade to 1.0.2i
OpenSSL 1.0.1 users should upgrade to 1.0.1u

Reference:

https://www.openssl.org/news/secadv/20160922.txt

(from redmine: issue id 6210, created on 2016-09-22, closed on 2016-09-22)

  • Relations:
    • parent #6206 (closed)
  • Changesets:
    • Revision 3e8e66af by Natanael Copa on 2016-09-22T14:19:05Z:
main/openssl: upgrade to 1.0.1u

fixes #6210
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking