The branch master has been updated via 895849e51989857491d7a0f817585b52d55f5fa7 (commit) via ccce450786377de0859518403f22be655bc48687 (commit) via e280d47ec748c8386e2cd88460b6b5235954a1fe (commit) from 8962398f72a4c4c04caf80069dcc59cb7a544c48 (commit)
- Log ----------------------------------------------------------------- commit 895849e51989857491d7a0f817585b52d55f5fa7 Author: Matt Caswell <m...@openssl.org> Date: Thu Jan 26 13:44:13 2017 +0000 Update vulnerabilities.xml for new release commit ccce450786377de0859518403f22be655bc48687 Author: Matt Caswell <m...@openssl.org> Date: Thu Jan 26 13:33:26 2017 +0000 Add security advisory for new release commit e280d47ec748c8386e2cd88460b6b5235954a1fe Author: Matt Caswell <m...@openssl.org> Date: Thu Jan 26 13:32:33 2017 +0000 Update newsflash for new release ----------------------------------------------------------------------- Summary of changes: news/newsflash.txt | 2 + news/secadv/20170126.txt | 97 ++++++++++++++++++++++++++++++++++++++++++++++++ news/vulnerabilities.xml | 93 +++++++++++++++++++++++++++++++++++++++++++++- 3 files changed, 191 insertions(+), 1 deletion(-) create mode 100644 news/secadv/20170126.txt diff --git a/news/newsflash.txt b/news/newsflash.txt index 525a960..35c30de 100644 --- a/news/newsflash.txt +++ b/news/newsflash.txt @@ -4,6 +4,8 @@ # Format is two fields, colon-separated; the first line is the column # headings. URL paths must all be absolute. Date: Item +26-Sep-2017: OpenSSL 1.1.0d is now available, including bug and security fixes +26-Sep-2017: OpenSSL 1.0.2k is now available, including bug and security fixes 23-Jan-2017: OpenSSL 1.1.0d, 1.0.2k <a href="https://mta.openssl.org/pipermail/openssl-announce/2017-January/000091.html">security release due on 26th January 2017</a> 02-Jan-2017: The OpenSSL 1.0.1 series of releases are now out of support. Please upgrade to 1.1.0 or 1.0.2. 10-Nov-2016: <a href="/news/secadv/20161110.txt">Security Advisory</a>: several security fixes diff --git a/news/secadv/20170126.txt b/news/secadv/20170126.txt new file mode 100644 index 0000000..5f69359 --- /dev/null +++ b/news/secadv/20170126.txt @@ -0,0 +1,97 @@ + +OpenSSL Security Advisory [26 Jan 2017] +======================================== + +Truncated packet could crash via OOB read (CVE-2017-3731) +========================================================= + +Severity: Moderate + +If an SSL/TLS server or client is running on a 32-bit host, and a specific +cipher is being used, then a truncated packet can cause that server or client +to perform an out-of-bounds read, usually resulting in a crash. + +For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; +users should upgrade to 1.1.0d + +For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have +not disabled that algorithm should update to 1.0.2k + +This issue was reported to OpenSSL on 13th November 2016 by Robert Święcki of +Google. The fix was developed by Andy Polyakov of the OpenSSL development team. + +Bad (EC)DHE parameters cause a client crash (CVE-2017-3730) +=========================================================== + +Severity: Moderate + +If a malicious server supplies bad parameters for a DHE or ECDHE key exchange +then this can result in the client attempting to dereference a NULL pointer +leading to a client crash. This could be exploited in a Denial of Service +attack. + +OpenSSL 1.1.0 users should upgrade to 1.1.0d + +This issue does not affect OpenSSL version 1.0.2. + +Note that this issue was fixed prior to it being recognised as a security +concern. This means the git commit with the fix does not contain the CVE +identifier. The relevant fix commit can be identified by commit hash efbe126e3. + +This issue was reported to OpenSSL on 14th January 2017 by Guido Vranken. The +fix was developed by Matt Caswell of the OpenSSL development team. + +BN_mod_exp may produce incorrect results on x86_64 (CVE-2017-3732) +================================================================== + +Severity: Moderate + +There is a carry propagating bug in the x86_64 Montgomery squaring procedure. No +EC algorithms are affected. Analysis suggests that attacks against RSA and DSA +as a result of this defect would be very difficult to perform and are not +believed likely. Attacks against DH are considered just feasible (although very +difficult) because most of the work necessary to deduce information +about a private key may be performed offline. The amount of resources +required for such an attack would be very significant and likely only +accessible to a limited number of attackers. An attacker would +additionally need online access to an unpatched system using the target +private key in a scenario with persistent DH parameters and a private +key that is shared between multiple clients. For example this can occur by +default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very +similar to CVE-2015-3193 but must be treated as a separate problem. + +OpenSSL 1.1.0 users should upgrade to 1.1.0d +OpenSSL 1.0.2 users should upgrade to 1.0.2k + +This issue was reported to OpenSSL on 15th January 2017 by the OSS-Fuzz project. +The fix was developed by Andy Polyakov of the OpenSSL development team. + +Montgomery multiplication may produce incorrect results (CVE-2016-7055) +======================================================================= + +Severity: Low + +This issue was previously fixed in 1.1.0c and covered in security advisory +https://www.openssl.org/news/secadv/20161110.txt + +OpenSSL 1.0.2k users should upgrade to 1.0.2k + + +Note +==== + +Support for version 1.0.1 ended on 31st December 2016. Support for versions +0.9.8 and 1.0.0 ended on 31st December 2015. Those versions are no longer +receiving security updates. + +References +========== + +URL for this Security Advisory: +https://www.openssl.org/news/secadv/20170126.txt + +Note: the online version of the advisory may be updated with additional details +over time. + +For details of OpenSSL severity classifications please see: +https://www.openssl.org/policies/secpolicy.html diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml index 1f716ff..6c32b4c 100644 --- a/news/vulnerabilities.xml +++ b/news/vulnerabilities.xml @@ -5,7 +5,97 @@ 1.0.0 on 20100329 --> -<security updated="20161110"> +<security updated="20170126"> + <issue public="20170126"> + <impact severity="Moderate"/> + <cve name="2017-3731"/> + <affects base="1.1.0" version="1.1.0"/> + <affects base="1.1.0" version="1.1.0a"/> + <affects base="1.1.0" version="1.1.0b"/> + <affects base="1.1.0" version="1.1.0c"/> + <affects base="1.0.2" version="1.0.2"/> + <affects base="1.0.2" version="1.0.2a"/> + <affects base="1.0.2" version="1.0.2b"/> + <affects base="1.0.2" version="1.0.2c"/> + <affects base="1.0.2" version="1.0.2d"/> + <affects base="1.0.2" version="1.0.2e"/> + <affects base="1.0.2" version="1.0.2f"/> + <affects base="1.0.2" version="1.0.2g"/> + <affects base="1.0.2" version="1.0.2h"/> + <affects base="1.0.2" version="1.0.2i"/> + <affects base="1.0.2" version="1.0.2j"/> + <fixed base="1.1.0" version="1.1.0d" date="20170126"/> + <fixed base="1.0.2" version="1.0.2k" date="20170126"/> + <description> + If an SSL/TLS server or client is running on a 32-bit host, and a specific + cipher is being used, then a truncated packet can cause that server or + client to perform an out-of-bounds read, usually resulting in a crash. + + For OpenSSL 1.1.0, the crash can be triggered when using + CHACHA20/POLY1305; users should upgrade to 1.1.0d. + + For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users + who have not disabled that algorithm should update to 1.0.2k + </description> + <advisory url="/news/secadv/20170126.txt"/> + <reported source="Robert Święcki of Google" /> + </issue> + <issue public="20170126"> + <impact severity="Moderate"/> + <cve name="2017-3730"/> + <affects base="1.1.0" version="1.1.0"/> + <affects base="1.1.0" version="1.1.0a"/> + <affects base="1.1.0" version="1.1.0b"/> + <affects base="1.1.0" version="1.1.0c"/> + <fixed base="1.1.0" version="1.1.0d" date="20170126"/> + <description> + If a malicious server supplies bad parameters for a DHE or ECDHE key + exchange then this can result in the client attempting to dereference a + NULL pointer leading to a client crash. This could be exploited in a + Denial of Service attack. + </description> + <advisory url="/news/secadv/20170126.txt"/> + <reported source="Guido Vranken" /> + </issue> + <issue public="20170126"> + <impact severity="Moderate"/> + <cve name="2017-3732"/> + <affects base="1.1.0" version="1.1.0"/> + <affects base="1.1.0" version="1.1.0a"/> + <affects base="1.1.0" version="1.1.0b"/> + <affects base="1.1.0" version="1.1.0c"/> + <affects base="1.0.2" version="1.0.2"/> + <affects base="1.0.2" version="1.0.2a"/> + <affects base="1.0.2" version="1.0.2b"/> + <affects base="1.0.2" version="1.0.2c"/> + <affects base="1.0.2" version="1.0.2d"/> + <affects base="1.0.2" version="1.0.2e"/> + <affects base="1.0.2" version="1.0.2f"/> + <affects base="1.0.2" version="1.0.2g"/> + <affects base="1.0.2" version="1.0.2h"/> + <affects base="1.0.2" version="1.0.2i"/> + <affects base="1.0.2" version="1.0.2j"/> + <fixed base="1.1.0" version="1.1.0d" date="20170126"/> + <fixed base="1.0.2" version="1.0.2k" date="20170126"/> + <description> + There is a carry propagating bug in the x86_64 Montgomery squaring + procedure. No EC algorithms are affected. Analysis suggests that attacks + against RSA and DSA as a result of this defect would be very difficult to + perform and are not believed likely. Attacks against DH are considered + just feasible (although very difficult) because most of the work necessary + to deduce information about a private key may be performed offline. The + amount of resources required for such an attack would be very significant + and likely only accessible to a limited number of attackers. An attacker + would additionally need online access to an unpatched system using the + target private key in a scenario with persistent DH parameters and a + private key that is shared between multiple clients. For example this can + occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This + issue is very similar to CVE-2015-3193 but must be treated as a separate + problem. + </description> + <advisory url="/news/secadv/20170126.txt"/> + <reported source="OSS-Fuzz project" /> + </issue> <issue public="20161110"> <impact severity="High"/> <cve name="2016-7054"/> @@ -57,6 +147,7 @@ <affects base="1.0.2" version="1.0.2i"/> <affects base="1.0.2" version="1.0.2j"/> <fixed base="1.1.0" version="1.1.0c" date="20161110"/> + <fixed base="1.0.2" version="1.0.2k" date="20170126"/> <description> There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure that handles input lengths divisible by, but _____ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits