Backported bugfix for CVE-2014-3571 causes regressions for DTLS in Ubuntu 14.04
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
openssl (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Precise |
Fix Released
|
Undecided
|
Marc Deslauriers | ||
Trusty |
Fix Released
|
Undecided
|
Marc Deslauriers |
Bug Description
In OpenSSL 1.0.1f on Ubuntu 14.04, there's a regression in using DTLS, caused by a backported bugfix for CVE-2014-3571.
This particular bugfix (debian/
This regression was fixed in OpenSSL 1.0.1m via this commit: https:/
This left OpenSSL 1.0.1k and 1.0.1l with the regression, plus Ubuntu 14.04 which backported the first fix but not the later one.
In Debian, their patches for 1.0.1e contain both fixes:
https:/
https:/
Please backport the second fix to the version of 1.0.1f that you maintain for 14.04 LTS.
summary: |
Backported bugfix for CVE-2014-3571 causes regressions for DTLS in + Ubuntu 14.04 |
Changed in openssl (Ubuntu Precise): | |
status: | New → Confirmed |
Changed in openssl (Ubuntu Trusty): | |
status: | New → Confirmed |
Changed in openssl (Ubuntu Precise): | |
assignee: | nobody → Marc Deslauriers (mdeslaur) |
Changed in openssl (Ubuntu Trusty): | |
assignee: | nobody → Marc Deslauriers (mdeslaur) |
Changed in openssl (Ubuntu): | |
status: | New → Invalid |
This bug was fixed in the package openssl - 1.0.1-4ubuntu5.37
---------------
openssl (1.0.1-4ubuntu5.37) precise-security; urgency=medium
* SECURITY UPDATE: Constant time flag not preserved in DSA signing patches/ CVE-2016- 2178-*. patch: preserve BN_FLG_CONSTTIME in dsa/dsa_ ossl.c. patches/ CVE-2016- 2179.patch: fix queue handling in d1_both. c, ssl/d1_clnt.c, ssl/d1_lib.c, ssl/d1_srvr.c, ssl_locl. h. patches/ CVE-2016- 2180.patch: fix text handling in ts/ts_lib. c. patches/ CVE-2016- 2181-1. patch: properly handle unprocessed patches/ CVE-2016- 2181-2. patch: protect against replay attacks patches/ CVE-2016- 2181-3. patch: update error code in ssl/ssl.h. patches/ CVE-2016- 2182.patch: don't overflow buffer in bn/bn_print. c. patches/ CVE-2016- 2183.patch: move DES ciphersuites from HIGH patches/ CVE-2016- 6302.patch: sanity check ticket length in patches/ CVE-2016- 6303.patch: avoid overflow in mdc2/mdc2dgst. c. patches/ CVE-2016- 6304.patch: remove OCSP_RESPIDs from previous patches/ CVE-2016- 6306-1. patch: check lengths in ssl/s3_clnt.c, s3_srvr. c. patches/ CVE-2016- 6306-2. patch: make message buffer slightly patches/ CVE-2014- 3571-3. patch: make DTLS always act as if patches/ update- expired- smime-test- certs.patch: Update test
- debian/
crypto/
- CVE-2016-2178
* SECURITY UPDATE: DTLS buffered message DoS
- debian/
ssl/
ssl/
- CVE-2016-2179
* SECURITY UPDATE: OOB read in TS_OBJ_print_bio()
- debian/
crypto/
- CVE-2016-2180
* SECURITY UPDATE: DTLS replay protection DoS
- debian/
records in ssl/d1_pkt.c.
- debian/
in ssl/d1_pkt.c, ssl/ssl.h, ssl/ssl_err.c.
- debian/
- CVE-2016-2181
* SECURITY UPDATE: OOB write in BN_bn2dec()
- debian/
crypto/
- CVE-2016-2182
* SECURITY UPDATE: SWEET32 Mitigation
- debian/
to MEDIUM in ssl/s3_lib.c.
- CVE-2016-2183
* SECURITY UPDATE: Malformed SHA512 ticket DoS
- debian/
ssl/t1_lib.c.
- CVE-2016-6302
* SECURITY UPDATE: OOB write in MDC2_Update()
- debian/
crypto/
- CVE-2016-6303
* SECURITY UPDATE: OCSP Status Request extension unbounded memory growth
- debian/
handshake in ssl/t1_lib.c.
- CVE-2016-6304
* SECURITY UPDATE: Certificate message OOB reads
- debian/
ssl/
- debian/
larger in ssl/d1_both.c, ssl/s3_both.c.
- CVE-2016-6306
* SECURITY REGRESSION: DTLS regression (LP: #1622500)
- debian/
read_ahead is set in ssl/s3_pkt.c.
* debian/
certificates that have expired and caused build test failures.
-- Marc Deslauriers <email address hidden> Thu, 22 Sep 2016 13:39:47 -0400