Errata ID | 139 |
---|---|
Date | 2016-04-06 |
Source package | openssl |
Fixed in version | 1.0.2d-1.117.201603211844 |
Description | Multiple vulnerabilities have been discovered in the OpenSSL libraries: * Denial of service via a zero p value in an anonymous Diffie-Hellman (DH) ServerKeyExchange message (CVE-2015-1794) * BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193) * Certificate verify crash with missing PSS parameter (CVE-2015-3194) * Memory leak in PKCS#7 and CMS routines (CVE-2015-3195) * The DH_check_pub_key function does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number (CVE-2016-0701) * Side channel attack on modular exponentiation (CVE-2016-0702) * Double-free in DSA code (CVE-2016-0705) * BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption (CVE-2016-0797) * Memory leak in SRP database lookups (CVE-2016-0798) * Memory issues in BIO_*printf functions (CVE-2016-0799) * OpenSSL in UCS 4.x is not vulnerable to CVE-2016-0800 because is is built without support for SSLv2. |
Additional notes | |
CVE ID | CVE-2015-1794 CVE-2015-3193 CVE-2015-3194 CVE-2015-3195 CVE-2016-0701 CVE-2016-0702 CVE-2016-0705 CVE-2016-0797 CVE-2016-0798 CVE-2016-0799 CVE-2016-0800 |
UCS Bug number | #40187 |