{"id":"USN-3087-2","summary":"openssl regression","details":"USN-3087-1 fixed vulnerabilities in OpenSSL. The fix for CVE-2016-2182 was\nincomplete and caused a regression when parsing certificates. This update\nfixes the problem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\n Shi Lei discovered that OpenSSL incorrectly handled the OCSP Status Request\n extension. A remote attacker could possibly use this issue to cause memory\n consumption, resulting in a denial of service. (CVE-2016-6304)\n \n Guido Vranken discovered that OpenSSL used undefined behaviour when\n performing pointer arithmetic. A remote attacker could possibly use this\n issue to cause OpenSSL to crash, resulting in a denial of service. This\n issue has only been addressed in Ubuntu 16.04 LTS in this update.\n (CVE-2016-2177)\n \n César Pereida, Billy Brumley, and Yuval Yarom discovered that OpenSSL\n did not properly use constant-time operations when performing DSA signing.\n A remote attacker could possibly use this issue to perform a cache-timing\n attack and recover private DSA keys. (CVE-2016-2178)\n \n Quan Luo discovered that OpenSSL did not properly restrict the lifetime\n of queue entries in the DTLS implementation. A remote attacker could\n possibly use this issue to consume memory, resulting in a denial of\n service. (CVE-2016-2179)\n \n Shi Lei discovered that OpenSSL incorrectly handled memory in the\n TS_OBJ_print_bio() function. A remote attacker could possibly use this\n issue to cause a denial of service. (CVE-2016-2180)\n \n It was discovered that the OpenSSL incorrectly handled the DTLS anti-replay\n feature. A remote attacker could possibly use this issue to cause a denial\n of service. (CVE-2016-2181)\n \n Shi Lei discovered that OpenSSL incorrectly validated division results. A\n remote attacker could possibly use this issue to cause a denial of service.\n (CVE-2016-2182)\n \n Karthik Bhargavan and Gaetan Leurent discovered that the DES and Triple DES\n ciphers were vulnerable to birthday attacks. A remote attacker could\n possibly use this flaw to obtain clear text data from long encrypted\n sessions. This update moves DES from the HIGH cipher list to MEDIUM.\n (CVE-2016-2183)\n \n Shi Lei discovered that OpenSSL incorrectly handled certain ticket lengths.\n A remote attacker could use this issue to cause a denial of service.\n (CVE-2016-6302)\n \n Shi Lei discovered that OpenSSL incorrectly handled memory in the\n MDC2_Update() function. A remote attacker could possibly use this issue to\n cause a denial of service. (CVE-2016-6303)\n \n Shi Lei discovered that OpenSSL incorrectly performed certain message\n length checks. A remote attacker could possibly use this issue to cause a\n denial of service. (CVE-2016-6306)\n","modified":"2026-04-22T09:28:24.083482Z","published":"2016-09-23T14:29:03Z","related":["UBUNTU-CVE-2016-2182"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3087-2"},{"type":"REPORT","url":"https://launchpad.net/bugs/1626883"}],"affected":[{"package":{"name":"openssl","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/openssl@1.0.1f-1ubuntu2.21?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.1f-1ubuntu2.21"}]}],"versions":["1.0.1e-3ubuntu1","1.0.1e-4ubuntu1","1.0.1e-4ubuntu2","1.0.1e-4ubuntu3","1.0.1e-4ubuntu4","1.0.1f-1ubuntu1","1.0.1f-1ubuntu2","1.0.1f-1ubuntu2.1","1.0.1f-1ubuntu2.2","1.0.1f-1ubuntu2.3","1.0.1f-1ubuntu2.4","1.0.1f-1ubuntu2.5","1.0.1f-1ubuntu2.7","1.0.1f-1ubuntu2.8","1.0.1f-1ubuntu2.11","1.0.1f-1ubuntu2.12","1.0.1f-1ubuntu2.15","1.0.1f-1ubuntu2.16","1.0.1f-1ubuntu2.17","1.0.1f-1ubuntu2.18","1.0.1f-1ubuntu2.19","1.0.1f-1ubuntu2.20"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1.0.1f-1ubuntu2.21","binary_name":"libssl1.0.0"},{"binary_version":"1.0.1f-1ubuntu2.21","binary_name":"openssl"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3087-2.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[]}}},{"package":{"name":"openssl","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/openssl@1.0.2g-1ubuntu4.5?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.2g-1ubuntu4.5"}]}],"versions":["1.0.2d-0ubuntu1","1.0.2d-0ubuntu2","1.0.2e-1ubuntu1","1.0.2f-2ubuntu1","1.0.2g-1ubuntu2","1.0.2g-1ubuntu3","1.0.2g-1ubuntu4","1.0.2g-1ubuntu4.1","1.0.2g-1ubuntu4.2","1.0.2g-1ubuntu4.4"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1.0.2g-1ubuntu4.5","binary_name":"libssl1.0.0"},{"binary_version":"1.0.2g-1ubuntu4.5","binary_name":"openssl"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3087-2.json","cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[]}}}],"schema_version":"1.7.5"}