OpenSSL Security Advisory [22 Sep 2016]

Security annoucements of interest to the AtomiCorp community, such as vulnerabilities in third party applications.
User avatar
mikeshinn
Atomicorp Staff - Site Admin
Atomicorp Staff - Site Admin
Posts: 4122
Joined: Thu Feb 07, 2008 7:49 pm
Location: Chantilly, VA

OpenSSL Security Advisory [22 Sep 2016]

Unread post by mikeshinn »

OCSP Status Request extension unbounded memory growth (CVE-2016-6304) - denial of service : Servers using OpenSSL versions prior to 1.0.1g are not vulnerable in a default configuration, instead only if an application explicitly enables OCSP stapling support. Redhat and Centos do not use that version of openssl, so as long as your applications arent forcing OCSP stapling support, you're safe.

SSL_peek() hang on empty record (CVE-2016-6305) - denial of service : This only effects systems running openssl 1.1.0. Redhat and Centos do not use that version of openssl.

SWEET32 Mitigation (CVE-2016-2183): This does not effect systems running ASL, as ASL already disabled these weak ciphers.
Post Reply