store | blogs | forums | twitter | facebook | wiki | downloads | support portal
Atomic Secure Linux
It is currently Sat Aug 24, 2019 7:41 am

» Feed - Atomicorp

All times are UTC - 5 hours [ DST ]




Post new topic Reply to topic  [ 1 post ] 
Author Message
 Post subject: OpenSSL Security Advisory [22 Sep 2016]
Unread postPosted: Thu Sep 22, 2016 5:11 pm 
Offline
Atomicorp Staff - Site Admin
Atomicorp Staff - Site Admin
User avatar

Joined: Thu Feb 07, 2008 7:49 pm
Posts: 4082
Location: Chantilly, VA
OCSP Status Request extension unbounded memory growth (CVE-2016-6304) - denial of service : Servers using OpenSSL versions prior to 1.0.1g are not vulnerable in a default configuration, instead only if an application explicitly enables OCSP stapling support. Redhat and Centos do not use that version of openssl, so as long as your applications arent forcing OCSP stapling support, you're safe.

SSL_peek() hang on empty record (CVE-2016-6305) - denial of service : This only effects systems running openssl 1.1.0. Redhat and Centos do not use that version of openssl.

SWEET32 Mitigation (CVE-2016-2183): This does not effect systems running ASL, as ASL already disabled these weak ciphers.

_________________
Michael Shinn
Atomicorp - Security For Everyone


Top
 Profile  
Reply with quote  
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 1 post ] 

» Feed - Atomicorp

All times are UTC - 5 hours [ DST ]


Who is online

Users browsing this forum: No registered users and 1 guest


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group