Page 1 of 1

OpenSSL Security Advisory [22 Sep 2016]

Posted: Thu Sep 22, 2016 5:11 pm
by mikeshinn
OCSP Status Request extension unbounded memory growth (CVE-2016-6304) - denial of service : Servers using OpenSSL versions prior to 1.0.1g are not vulnerable in a default configuration, instead only if an application explicitly enables OCSP stapling support. Redhat and Centos do not use that version of openssl, so as long as your applications arent forcing OCSP stapling support, you're safe.

SSL_peek() hang on empty record (CVE-2016-6305) - denial of service : This only effects systems running openssl 1.1.0. Redhat and Centos do not use that version of openssl.

SWEET32 Mitigation (CVE-2016-2183): This does not effect systems running ASL, as ASL already disabled these weak ciphers.