[openssl-commits] [web] master update

Mark J. Cox mark at openssl.org
Wed Mar 29 07:03:35 UTC 2017


The branch master has been updated
       via  9e202bb48ed00656e8af83e6cd654a4e2209948a (commit)
      from  e5f2c86257184fc2a9331d5ea53fd9f790e7181b (commit)


- Log -----------------------------------------------------------------
commit 9e202bb48ed00656e8af83e6cd654a4e2209948a
Author: Mark J. Cox <mark at awe.com>
Date:   Wed Mar 29 08:02:28 2017 +0100

    CNA requirements have a field for "problem type" which is vaguely defined
    but we'll need to provide it.  Also add a "title" field to newer entries
    as this is in our advisories already but missing from the vulns html page
    (not added there yet however)

-----------------------------------------------------------------------

Summary of changes:
 news/vulnerabilities.xml | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)

diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index 3d759a8..668e987 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -15,6 +15,8 @@
     <affects base="1.1.0" version="1.1.0c"/>
     <affects base="1.1.0" version="1.1.0d"/>
     <fixed base="1.1.0" version="1.1.0e" date="20170216"/>
+    <problemtype>protocol error</problemtype>
+    <title>Encrypt-Then-Mac renegotiation crash</title>
     <description>
       During a renegotiation handshake if the Encrypt-Then-Mac extension is
       negotiated where it was not in the original handshake (or vice-versa) then
@@ -44,6 +46,8 @@
     <affects base="1.0.2" version="1.0.2j"/>
     <fixed base="1.1.0" version="1.1.0d" date="20170126"/>
     <fixed base="1.0.2" version="1.0.2k" date="20170126"/>
+    <problemtype>out-of-bounds read</problemtype>
+    <title>Truncated packet could crash via OOB read</title>
     <description>
       If an SSL/TLS server or client is running on a 32-bit host, and a specific
       cipher is being used, then a truncated packet can cause that server or
@@ -66,6 +70,8 @@
     <affects base="1.1.0" version="1.1.0b"/>
     <affects base="1.1.0" version="1.1.0c"/>
     <fixed base="1.1.0" version="1.1.0d" date="20170126"/>
+    <problemtype>NULL pointer deference</problemtype>
+    <title>Bad (EC)DHE parameters cause a client crash</title>
     <description>
       If a malicious server supplies bad parameters for a DHE or ECDHE key
       exchange then this can result in the client attempting to dereference a
@@ -95,6 +101,8 @@
     <affects base="1.0.2" version="1.0.2j"/>
     <fixed base="1.1.0" version="1.1.0d" date="20170126"/>
     <fixed base="1.0.2" version="1.0.2k" date="20170126"/>
+    <problemtype>carry-propagating bug</problemtype>
+    <title>BN_mod_exp may produce incorrect results on x86_64</title>
     <description>
       There is a carry propagating bug in the x86_64 Montgomery squaring
       procedure. No EC algorithms are affected. Analysis suggests that attacks
@@ -121,6 +129,8 @@
     <affects base="1.1.0" version="1.1.0a"/>
     <affects base="1.1.0" version="1.1.0b"/>
     <fixed base="1.1.0" version="1.1.0c" date="20161110"/>
+    <problemtype>protocol error</problemtype>
+    <title>ChaCha20/Poly1305 heap-buffer-overflow</title>
     <description>
       TLS connections using *-CHACHA20-POLY1305 ciphersuites are susceptible to
       a DoS attack by corrupting larger payloads. This can result in an OpenSSL
@@ -136,6 +146,8 @@
     <affects base="1.1.0" version="1.1.0a"/>
     <affects base="1.1.0" version="1.1.0b"/>
     <fixed base="1.1.0" version="1.1.0c" date="20161110"/>
+    <problemtype>NULL pointer deference</problemtype>
+    <title>CMS Null dereference</title>
     <description>
       Applications parsing invalid CMS structures can crash with a NULL pointer
       dereference. This is caused by a bug in the handling of the ASN.1 CHOICE
@@ -166,6 +178,8 @@
     <affects base="1.0.2" version="1.0.2j"/>
     <fixed base="1.1.0" version="1.1.0c" date="20161110"/>
     <fixed base="1.0.2" version="1.0.2k" date="20170126"/>
+    <problemtype>carry propagating bug</problemtype>
+    <title>Montgomery multiplication may produce incorrect results</title>
     <description>
       There is a carry propagating bug in the Broadwell-specific Montgomery
       multiplication procedure that handles input lengths divisible by, but
@@ -193,6 +207,7 @@
     <affects base="1.1.0" version="1.1.0a"/>
     <fixed base="1.1.0" version="1.1.0b" date="20160926"/>
 
+    <problemtype>write to free</problemtype>                    
     <description>
       This issue only affects OpenSSL 1.1.0a, released on 22nd September 2016.
 
@@ -212,6 +227,7 @@
     <affects base="1.0.2" version="1.0.2i"/>
     <fixed base="1.0.2" version="1.0.2j" date="20160926"/>
 
+    <problemtype>NULL pointer exception</problemtype>                        
     <description>
       This issue only affects OpenSSL 1.0.2i, released on 22nd September 2016.
 
@@ -260,6 +276,7 @@
     <fixed base="1.0.2" version="1.0.2i" date="20160922"/>
     <fixed base="1.1.0" version="1.1.0a" date="20160922"/>
 
+    <problemtype>memory leak</problemtype>                            
     <description>
       A malicious client can send an excessively large OCSP Status Request extension.
       If that client continually requests renegotiation, sending a large OCSP Status


More information about the openssl-commits mailing list