From owner-svn-ports-all@freebsd.org Thu Jan 28 15:20:13 2016 Return-Path: Delivered-To: svn-ports-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 290C7A71761; Thu, 28 Jan 2016 15:20:13 +0000 (UTC) (envelope-from dinoex@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id DFEF11A79; Thu, 28 Jan 2016 15:20:12 +0000 (UTC) (envelope-from dinoex@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id u0SFKB53012532; Thu, 28 Jan 2016 15:20:11 GMT (envelope-from dinoex@FreeBSD.org) Received: (from dinoex@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id u0SFKB4l012530; Thu, 28 Jan 2016 15:20:11 GMT (envelope-from dinoex@FreeBSD.org) Message-Id: <201601281520.u0SFKB4l012530@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: dinoex set sender to dinoex@FreeBSD.org using -f From: Dirk Meyer Date: Thu, 28 Jan 2016 15:20:11 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r407412 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 28 Jan 2016 15:20:13 -0000 Author: dinoex Date: Thu Jan 28 15:20:11 2016 New Revision: 407412 URL: https://svnweb.freebsd.org/changeset/ports/407412 Log: - report OpenSSL 1.0.2e vulnerability MFH: 2016Q1 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Jan 28 15:09:46 2016 (r407411) +++ head/security/vuxml/vuln.xml Thu Jan 28 15:20:11 2016 (r407412) @@ -58,6 +58,59 @@ Notes: --> + + openssl -- multiple vulnerabilities + + + openssl + 1.0.2_7 + + + mingw32-openssl + 1.0.11.0.2f + + + + +

OpenSSL project reports:

+
+
    +
  1. Historically OpenSSL only ever generated DH parameters based on "safe" + primes. More recently (in version 1.0.2) support was provided for + generating X9.42 style parameter files such as those required for RFC 5114 + support. The primes used in such files may not be "safe". Where an + application is using DH configured with parameters based on primes that are + not "safe" then an attacker could use this fact to find a peer's private + DH exponent. This attack requires that the attacker complete multiple + handshakes in which the peer uses the same private DH exponent. For example + this could be used to discover a TLS server's private DH exponent if it's + reusing the private DH exponent or it's using a static DH ciphersuite. + OpenSSL provides the option SSL_OP_SINGLE_DH_USE for ephemeral DH (DHE) in + TLS. It is not on by default. If the option is not set then the server + reuses the same private DH exponent for the life of the server process and + would be vulnerable to this attack. It is believed that many popular + applications do set this option and would therefore not be at risk. + (CVE-2016-0701)
  2. +
  3. A malicious client can negotiate SSLv2 ciphers that have been disabled on + the server and complete SSLv2 handshakes even if all SSLv2 ciphers have + been disabled, provided that the SSLv2 protocol was not also disabled via + SSL_OP_NO_SSLv2. + (CVE-2015-3197)
  4. +
+
+ +
+ + CVE-2016-0701 + CVE-2015-3197 + https://www.openssl.org/news/secadv/20160128.txt + + + 2016-01-22 + 2016-01-28 + +
+ curl -- Credentials not checked