[ubuntu/yakkety-proposed] openssl 1.0.2g-1ubuntu9 (Accepted)

Marc Deslauriers marc.deslauriers at ubuntu.com
Fri Sep 23 17:17:25 UTC 2016


openssl (1.0.2g-1ubuntu9) yakkety; urgency=medium

  * SECURITY UPDATE: Pointer arithmetic undefined behaviour
    - debian/patches/CVE-2016-2177.patch: avoid undefined pointer
      arithmetic in ssl/s3_srvr.c, ssl/ssl_sess.c, ssl/t1_lib.c.
    - CVE-2016-2177
  * SECURITY UPDATE: Constant time flag not preserved in DSA signing
    - debian/patches/CVE-2016-2178-*.patch: preserve BN_FLG_CONSTTIME in
      crypto/dsa/dsa_ossl.c.
    - CVE-2016-2178
  * SECURITY UPDATE: DTLS buffered message DoS
    - debian/patches/CVE-2016-2179.patch: fix queue handling in
      ssl/d1_both.c, ssl/d1_clnt.c, ssl/d1_lib.c, ssl/d1_srvr.c,
      ssl/ssl_locl.h.
    - CVE-2016-2179
  * SECURITY UPDATE: OOB read in TS_OBJ_print_bio()
    - debian/patches/CVE-2016-2180.patch: fix text handling in
      crypto/ts/ts_lib.c.
    - CVE-2016-2180
  * SECURITY UPDATE: DTLS replay protection DoS
    - debian/patches/CVE-2016-2181-1.patch: properly handle unprocessed
      records in ssl/d1_pkt.c.
    - debian/patches/CVE-2016-2181-2.patch: protect against replay attacks
      in ssl/d1_pkt.c, ssl/ssl.h, ssl/ssl_err.c.
    - debian/patches/CVE-2016-2181-3.patch: update error code in ssl/ssl.h.
    - CVE-2016-2181
  * SECURITY UPDATE: OOB write in BN_bn2dec()
    - debian/patches/CVE-2016-2182.patch: don't overflow buffer in
      crypto/bn/bn_print.c.
    - debian/patches/CVE-2016-2182-2.patch: fix off-by-one in overflow
      check in crypto/bn/bn_print.c.
    - CVE-2016-2182
  * SECURITY UPDATE: SWEET32 Mitigation
    - debian/patches/CVE-2016-2183.patch: move DES ciphersuites from HIGH
      to MEDIUM in ssl/s3_lib.c.
    - CVE-2016-2183
  * SECURITY UPDATE: Malformed SHA512 ticket DoS
    - debian/patches/CVE-2016-6302.patch: sanity check ticket length in
      ssl/t1_lib.c.
    - CVE-2016-6302
  * SECURITY UPDATE: OOB write in MDC2_Update()
    - debian/patches/CVE-2016-6303.patch: avoid overflow in
      crypto/mdc2/mdc2dgst.c.
    - CVE-2016-6303
  * SECURITY UPDATE: OCSP Status Request extension unbounded memory growth
    - debian/patches/CVE-2016-6304.patch: remove OCSP_RESPIDs from previous
      handshake in ssl/t1_lib.c.
    - CVE-2016-6304
  * SECURITY UPDATE: Certificate message OOB reads
    - debian/patches/CVE-2016-6306-1.patch: check lengths in ssl/s3_clnt.c,
      ssl/s3_srvr.c.
    - debian/patches/CVE-2016-6306-2.patch: make message buffer slightly
      larger in ssl/d1_both.c, ssl/s3_both.c.
    - CVE-2016-6306

Date: Fri, 23 Sep 2016 11:00:22 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu9
-------------- next part --------------
Format: 1.8
Date: Fri, 23 Sep 2016 11:00:22 -0400
Source: openssl
Binary: openssl libssl1.0.0 libcrypto1.0.0-udeb libssl1.0.0-udeb libssl-dev libssl-doc libssl1.0.0-dbg
Architecture: source
Version: 1.0.2g-1ubuntu9
Distribution: yakkety
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description:
 libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
 libssl-dev - Secure Sockets Layer toolkit - development files
 libssl-doc - Secure Sockets Layer toolkit - development documentation
 libssl1.0.0 - Secure Sockets Layer toolkit - shared libraries
 libssl1.0.0-dbg - Secure Sockets Layer toolkit - debug information
 libssl1.0.0-udeb - ssl shared library - udeb (udeb)
 openssl    - Secure Sockets Layer toolkit - cryptographic utility
Changes:
 openssl (1.0.2g-1ubuntu9) yakkety; urgency=medium
 .
   * SECURITY UPDATE: Pointer arithmetic undefined behaviour
     - debian/patches/CVE-2016-2177.patch: avoid undefined pointer
       arithmetic in ssl/s3_srvr.c, ssl/ssl_sess.c, ssl/t1_lib.c.
     - CVE-2016-2177
   * SECURITY UPDATE: Constant time flag not preserved in DSA signing
     - debian/patches/CVE-2016-2178-*.patch: preserve BN_FLG_CONSTTIME in
       crypto/dsa/dsa_ossl.c.
     - CVE-2016-2178
   * SECURITY UPDATE: DTLS buffered message DoS
     - debian/patches/CVE-2016-2179.patch: fix queue handling in
       ssl/d1_both.c, ssl/d1_clnt.c, ssl/d1_lib.c, ssl/d1_srvr.c,
       ssl/ssl_locl.h.
     - CVE-2016-2179
   * SECURITY UPDATE: OOB read in TS_OBJ_print_bio()
     - debian/patches/CVE-2016-2180.patch: fix text handling in
       crypto/ts/ts_lib.c.
     - CVE-2016-2180
   * SECURITY UPDATE: DTLS replay protection DoS
     - debian/patches/CVE-2016-2181-1.patch: properly handle unprocessed
       records in ssl/d1_pkt.c.
     - debian/patches/CVE-2016-2181-2.patch: protect against replay attacks
       in ssl/d1_pkt.c, ssl/ssl.h, ssl/ssl_err.c.
     - debian/patches/CVE-2016-2181-3.patch: update error code in ssl/ssl.h.
     - CVE-2016-2181
   * SECURITY UPDATE: OOB write in BN_bn2dec()
     - debian/patches/CVE-2016-2182.patch: don't overflow buffer in
       crypto/bn/bn_print.c.
     - debian/patches/CVE-2016-2182-2.patch: fix off-by-one in overflow
       check in crypto/bn/bn_print.c.
     - CVE-2016-2182
   * SECURITY UPDATE: SWEET32 Mitigation
     - debian/patches/CVE-2016-2183.patch: move DES ciphersuites from HIGH
       to MEDIUM in ssl/s3_lib.c.
     - CVE-2016-2183
   * SECURITY UPDATE: Malformed SHA512 ticket DoS
     - debian/patches/CVE-2016-6302.patch: sanity check ticket length in
       ssl/t1_lib.c.
     - CVE-2016-6302
   * SECURITY UPDATE: OOB write in MDC2_Update()
     - debian/patches/CVE-2016-6303.patch: avoid overflow in
       crypto/mdc2/mdc2dgst.c.
     - CVE-2016-6303
   * SECURITY UPDATE: OCSP Status Request extension unbounded memory growth
     - debian/patches/CVE-2016-6304.patch: remove OCSP_RESPIDs from previous
       handshake in ssl/t1_lib.c.
     - CVE-2016-6304
   * SECURITY UPDATE: Certificate message OOB reads
     - debian/patches/CVE-2016-6306-1.patch: check lengths in ssl/s3_clnt.c,
       ssl/s3_srvr.c.
     - debian/patches/CVE-2016-6306-2.patch: make message buffer slightly
       larger in ssl/d1_both.c, ssl/s3_both.c.
     - CVE-2016-6306
Checksums-Sha1:
 cd5ddbcb6a1d354a7461dcad70a894481821be60 2427 openssl_1.0.2g-1ubuntu9.dsc
 37eb0069c30cc5122f963530e37dcf0dde17cfc5 106932 openssl_1.0.2g-1ubuntu9.debian.tar.xz
Checksums-Sha256:
 3954a2abb3f9fb9853a9dcce6440a4aec0a9eb062cc213330b32380094f90111 2427 openssl_1.0.2g-1ubuntu9.dsc
 977f232bc2da0697edbda18a60db6c0550b7b975356428e6e0f9c039f9a08140 106932 openssl_1.0.2g-1ubuntu9.debian.tar.xz
Files:
 bf7342aab4b38b3a52d35713e2233030 2427 utils optional openssl_1.0.2g-1ubuntu9.dsc
 85599b9867363ae82db8732ca58a3dd9 106932 utils optional openssl_1.0.2g-1ubuntu9.debian.tar.xz
Original-Maintainer: Debian OpenSSL Team <pkg-openssl-devel at lists.alioth.debian.org>


More information about the Yakkety-changes mailing list