This bug was fixed in the package openssl - 1.0.1f-1ubuntu2.20
--------------- openssl (1.0.1f-1ubuntu2.20) trusty-security; urgency=medium
* SECURITY UPDATE: Constant time flag not preserved in DSA signing - debian/patches/CVE-2016-2178-*.patch: preserve BN_FLG_CONSTTIME in crypto/dsa/dsa_ossl.c. - CVE-2016-2178 * SECURITY UPDATE: DTLS buffered message DoS - debian/patches/CVE-2016-2179.patch: fix queue handling in ssl/d1_both.c, ssl/d1_clnt.c, ssl/d1_lib.c, ssl/d1_srvr.c, ssl/ssl_locl.h. - CVE-2016-2179 * SECURITY UPDATE: OOB read in TS_OBJ_print_bio() - debian/patches/CVE-2016-2180.patch: fix text handling in crypto/ts/ts_lib.c. - CVE-2016-2180 * SECURITY UPDATE: DTLS replay protection DoS - debian/patches/CVE-2016-2181-1.patch: properly handle unprocessed records in ssl/d1_pkt.c. - debian/patches/CVE-2016-2181-2.patch: protect against replay attacks in ssl/d1_pkt.c, ssl/ssl.h, ssl/ssl_err.c. - debian/patches/CVE-2016-2181-3.patch: update error code in ssl/ssl.h. - CVE-2016-2181 * SECURITY UPDATE: OOB write in BN_bn2dec() - debian/patches/CVE-2016-2182.patch: don't overflow buffer in crypto/bn/bn_print.c. - CVE-2016-2182 * SECURITY UPDATE: SWEET32 Mitigation - debian/patches/CVE-2016-2183.patch: move DES ciphersuites from HIGH to MEDIUM in ssl/s3_lib.c. - CVE-2016-2183 * SECURITY UPDATE: Malformed SHA512 ticket DoS - debian/patches/CVE-2016-6302.patch: sanity check ticket length in ssl/t1_lib.c. - CVE-2016-6302 * SECURITY UPDATE: OOB write in MDC2_Update() - debian/patches/CVE-2016-6303.patch: avoid overflow in crypto/mdc2/mdc2dgst.c. - CVE-2016-6303 * SECURITY UPDATE: OCSP Status Request extension unbounded memory growth - debian/patches/CVE-2016-6304.patch: remove OCSP_RESPIDs from previous handshake in ssl/t1_lib.c. - CVE-2016-6304 * SECURITY UPDATE: Certificate message OOB reads - debian/patches/CVE-2016-6306-1.patch: check lengths in ssl/s3_clnt.c, ssl/s3_srvr.c. - debian/patches/CVE-2016-6306-2.patch: make message buffer slightly larger in ssl/d1_both.c, ssl/s3_both.c. - CVE-2016-6306 * SECURITY REGRESSION: DTLS regression (LP: #1622500) - debian/patches/CVE-2014-3571-3.patch: make DTLS always act as if read_ahead is set in ssl/s3_pkt.c. * debian/patches/update-expired-smime-test-certs.patch: Update test certificates that have expired and caused build test failures.
-- Marc Deslauriers <email address hidden> Thu, 22 Sep 2016 13:38:15 -0400
This bug was fixed in the package openssl - 1.0.1f-1ubuntu2.20
--------------- 1ubuntu2. 20) trusty-security; urgency=medium
openssl (1.0.1f-
* SECURITY UPDATE: Constant time flag not preserved in DSA signing patches/ CVE-2016- 2178-*. patch: preserve BN_FLG_CONSTTIME in dsa/dsa_ ossl.c. patches/ CVE-2016- 2179.patch: fix queue handling in d1_both. c, ssl/d1_clnt.c, ssl/d1_lib.c, ssl/d1_srvr.c, ssl_locl. h. patches/ CVE-2016- 2180.patch: fix text handling in ts/ts_lib. c. patches/ CVE-2016- 2181-1. patch: properly handle unprocessed patches/ CVE-2016- 2181-2. patch: protect against replay attacks patches/ CVE-2016- 2181-3. patch: update error code in ssl/ssl.h. patches/ CVE-2016- 2182.patch: don't overflow buffer in bn/bn_print. c. patches/ CVE-2016- 2183.patch: move DES ciphersuites from HIGH patches/ CVE-2016- 6302.patch: sanity check ticket length in patches/ CVE-2016- 6303.patch: avoid overflow in mdc2/mdc2dgst. c. patches/ CVE-2016- 6304.patch: remove OCSP_RESPIDs from previous patches/ CVE-2016- 6306-1. patch: check lengths in ssl/s3_clnt.c, s3_srvr. c. patches/ CVE-2016- 6306-2. patch: make message buffer slightly patches/ CVE-2014- 3571-3. patch: make DTLS always act as if patches/ update- expired- smime-test- certs.patch: Update test
- debian/
crypto/
- CVE-2016-2178
* SECURITY UPDATE: DTLS buffered message DoS
- debian/
ssl/
ssl/
- CVE-2016-2179
* SECURITY UPDATE: OOB read in TS_OBJ_print_bio()
- debian/
crypto/
- CVE-2016-2180
* SECURITY UPDATE: DTLS replay protection DoS
- debian/
records in ssl/d1_pkt.c.
- debian/
in ssl/d1_pkt.c, ssl/ssl.h, ssl/ssl_err.c.
- debian/
- CVE-2016-2181
* SECURITY UPDATE: OOB write in BN_bn2dec()
- debian/
crypto/
- CVE-2016-2182
* SECURITY UPDATE: SWEET32 Mitigation
- debian/
to MEDIUM in ssl/s3_lib.c.
- CVE-2016-2183
* SECURITY UPDATE: Malformed SHA512 ticket DoS
- debian/
ssl/t1_lib.c.
- CVE-2016-6302
* SECURITY UPDATE: OOB write in MDC2_Update()
- debian/
crypto/
- CVE-2016-6303
* SECURITY UPDATE: OCSP Status Request extension unbounded memory growth
- debian/
handshake in ssl/t1_lib.c.
- CVE-2016-6304
* SECURITY UPDATE: Certificate message OOB reads
- debian/
ssl/
- debian/
larger in ssl/d1_both.c, ssl/s3_both.c.
- CVE-2016-6306
* SECURITY REGRESSION: DTLS regression (LP: #1622500)
- debian/
read_ahead is set in ssl/s3_pkt.c.
* debian/
certificates that have expired and caused build test failures.
-- Marc Deslauriers <email address hidden> Thu, 22 Sep 2016 13:38:15 -0400