[openssl-commits] [web] master update

Matt Caswell matt at openssl.org
Fri Dec 4 14:36:20 UTC 2015


The branch master has been updated
       via  fcace5ea8033431af48292d859b0c23157c5bd3c (commit)
      from  1a3906055598e138b7a565567e5ecf0457d0092a (commit)


- Log -----------------------------------------------------------------
commit fcace5ea8033431af48292d859b0c23157c5bd3c
Author: Matt Caswell <matt at openssl.org>
Date:   Fri Dec 4 14:30:05 2015 +0000

    Updated security advisory added

-----------------------------------------------------------------------

Summary of changes:
 news/secadv/20151203.txt | 24 ++++++++++++++++++++++--
 news/vulnerabilities.xml | 17 +++++++++++++++++
 2 files changed, 39 insertions(+), 2 deletions(-)

diff --git a/news/secadv/20151203.txt b/news/secadv/20151203.txt
index 44051a2..b1d0bb9 100644
--- a/news/secadv/20151203.txt
+++ b/news/secadv/20151203.txt
@@ -1,5 +1,9 @@
-OpenSSL Security Advisory [3 Dec 2015]
-=======================================
+OpenSSL Security Advisory [3 Dec 2015] - Updated [4 Dec 2015]
+=============================================================
+
+[Updated 4 Dec 2015]: This advisory has been updated to include the details of
+CVE-2015-1794, a Low severity issue affecting OpenSSL 1.0.2 which had a fix
+included in the released packages but was missed from the advisory text.
 
 NOTE: WE ANTICIPATE THAT 1.0.0t AND 0.9.8zh WILL BE THE LAST RELEASES FOR THE
 0.9.8 AND 1.0.0 VERSIONS AND THAT NO MORE SECURITY FIXES WILL BE PROVIDED (AS
@@ -97,6 +101,22 @@ ids 3c66a669dfc7 (1.0.2), d6be3124f228 (1.0.1) and 1392c238657e (1.0.0).
 
 The fix was developed by Dr. Stephen Henson of the OpenSSL development team.
 
+Anon DH ServerKeyExchange with 0 p parameter (CVE-2015-1794)
+============================================================
+
+Severity: Low
+
+If a client receives a ServerKeyExchange for an anonymous DH ciphersuite with
+the value of p set to 0 then a seg fault can occur leading to a possible denial
+of service attack.
+
+This issue affects OpenSSL version 1.0.2.
+
+OpenSSL 1.0.2 users should upgrade to 1.0.2e
+
+This issue was reported to OpenSSL on August 3 2015 by Guy Leaver (Cisco). The
+fix was developed by Matt Caswell of the OpenSSL development team.
+
 Note
 ====
 
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index b2629d7..c8d7895 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -6,6 +6,23 @@
 -->
 
 <security updated="20151203">
+  <issue public="20150811">
+    <cve name="2015-1794"/>
+    <affects base="1.0.2" version="1.0.2"/>
+    <affects base="1.0.2" version="1.0.2a"/>
+    <affects base="1.0.2" version="1.0.2b"/>
+    <affects base="1.0.2" version="1.0.2c"/>
+    <affects base="1.0.2" version="1.0.2d"/>
+    <fixed base="1.0.2" version="1.0.2e" date="20151203"/>
+
+    <description>
+      If a client receives a ServerKeyExchange for an anonymous DH ciphersuite with
+      the value of p set to 0 then a seg fault can occur leading to a possible denial
+      of service attack.
+    </description>
+    <advisory url="/news/secadv/20151203.txt"/>
+    <reported source="Guy Leaver (Cisco)"/>
+  </issue>
   <issue public="20151203">
     <cve name="2015-3193"/>
     <affects base="1.0.2" version="1.0.2"/>


More information about the openssl-commits mailing list