On Thu, Oct 15, 2015 at 08:29:25PM -0400, Ted Unangst wrote:
> The OBJ_obj2txt function in libcrypto contains a one byte buffer overrun
> and memory leak, as reported by Qualys Security. This can be abused by an
> attacker to cause a denial of service in some cases.
> 
> Patches are now available for OpenBSD as well as new releases of LibreSSL
> portable. 5.6, 5.7, and 5.8 are affected, as well as all releases of LibreSSL.
> 
> Note that in addition to the instructions to rebuild libcrypto in the patch,
> some binaries may link statically with libcrypto (isakmpd, iked, ...) and need
> rebuilding as well. And services restarted.

Ted, what exactly binaries need to be rebuilded? isakmpd, iked, ftp(?) 
something else?

> 
> OpenBSD patches:
> http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/033_obj2txt.patch.sig
> http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/019_obj2txt.patch.sig
> http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/007_obj2txt.patch.sig
> 
> LibreSSL releases:
> http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.0.6.tar.gz
> http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.1.8.tar.gz
> http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.4.tar.gz
> 
> There will be a libressl-2.3.1 release coming, but as a reminder it's still a
> development branch. (The OpenBSD patches should apply to 2.3.0 as well.)
> 
> With the release of OpenBSD 5.8 in a few days, 5.6 will be officially retired
> from support, and along with it LibreSSL 2.0. Hopefully, this will be the last
> release in that line.
> 
> 

Reply via email to