FB_security 板


help 2014-04-08 20:00 GMT+08:00 <[email protected]>: > Send freebsd-security mailing list submissions to > [email protected] > > To subscribe or unsubscribe via the World Wide Web, visit > http://lists.freebsd.org/mailman/listinfo/freebsd-security > or, via email, send a message with subject or body 'help' to > [email protected] > > You can reach the person managing the list at > [email protected] > > When replying, please edit your Subject line so it is more specific > than "Re: Contents of freebsd-security digest..." > > > Today's Topics: > > 1. http://heartbleed.com/ (Thomas Steen Rasmussen) > 2. Re: http://heartbleed.com/ (Xin Li) > 3. Re: http://heartbleed.com/ (Mike Tancsa) > 4. Re: http://heartbleed.com/ (Xin Li) > 5. Re: http://heartbleed.com/ (Bryan Drewery) > > > ---------------------------------------------------------------------- > > Message: 1 > Date: Mon, 07 Apr 2014 22:49:54 +0200 > From: Thomas Steen Rasmussen <[email protected]> > To: [email protected] > Subject: http://heartbleed.com/ > Message-ID: <[email protected]> > Content-Type: text/plain; charset=ISO-8859-1 > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Hello, > > http://heartbleed.com/ describes an openssl vulnerability published > today. We are going to need an advisory for the openssl in base in > FreeBSD 10 and we are also going to need an updated port. > > The implications of this vulnerability are pretty massive, > certificates will need to be replaced and so on. I don't want to > repeat the page, so go read that. > > Best regards, > > > /Thomas Steen Rasmussen > > ps. there is a bit on the openssl site too: > https://www.openssl.org/news/secadv_20140407.txt > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v2.0.22 (MingW32) > Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ > > iQIcBAEBAgAGBQJTQw9yAAoJEHcv938JcvpYcFgP/iH3j6n7PgkCwSsN3qG9F37c > A6TOGbKudIeJdO76YXiU2T+FjbMThB86KuSan2iTM4h5wTLENVLvafJmBJtIKRH8 > bMZUqsUONYBSd4HpZKxbg9s8Yfy2gU0dTbs10OZ/dZw6qEr5Pd0WK6BDZ5h0ggTj > 0gF4r+FHWAe/8GgxOnfVEcmyMa+VUB46ZMmpwlCC3SG0wMAs/LJHORyl283OqyT5 > fwNfeDjInsPAgZORdR2+PZTgshwL0ogOINyGSKrLV1psQg2hEMgRT4GvO37IlhHS > qstYleB0yLiq9ayRFyj3mg2/OMq7/26ft09fHeF19VjnysClxT7lwZEaPDkbxH7j > qC1rpo1yeGuBPPdFnjbZVP5rxLR1jnQZFgTwOafjjock8ZW1ktUXOg1Upe276sv9 > NrPmNzDUkuMp7tlYEuDC2MsxQNSjeCo86FdMGCH+/c+DbRqBidELFH8SYEgzK2kj > TiT8tmBjdLC8PL+1SvBV4hLgapFJp2nvXsxyuJc2teRntKdgjFObQPEzb+iM/zFA > mSOjuGUh28qABlqQ32B04VDBOQRUs6zWDe0cssspajqfx7T7wVaE1FGBDUUt0QkN > B45cs2ql0OG5XB03GLsJv0tSdymzwohlBmoqmA08mKVWILFdkL/zzSY8Mw0oTfUa > GWD5kOI/wytuF5svXFnP > =gj4I > -----END PGP SIGNATURE----- > > > ------------------------------ > > Message: 2 > Date: Mon, 07 Apr 2014 14:02:45 -0700 > From: Xin Li <[email protected]> > To: Thomas Steen Rasmussen <[email protected]>, > [email protected] > Subject: Re: http://heartbleed.com/ > Message-ID: <[email protected]> > Content-Type: text/plain; charset="iso-8859-1" > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > Hi, Thomas, > > On 04/07/14 13:49, Thomas Steen Rasmussen wrote: > > Hello, > > > > http://heartbleed.com/ describes an openssl vulnerability > > published today. We are going to need an advisory for the openssl > > in base in FreeBSD 10 and we are also going to need an updated > > port. > > > > The implications of this vulnerability are pretty massive, > > certificates will need to be replaced and so on. I don't want to > > repeat the page, so go read that. > > We are already working on this but building, reviewing, etc. would > take some time. > > Attached is the minimal fix (extracted from upstream git repository) > we are intending to use in the advisory for those who want to apply a > fix now, please DO NOT use any new certificates before applying fixes. > > Cheers, > - -- > Xin LI <[email protected]> https://www.delphij.net/ > FreeBSD - The Power to Serve! Live free or die > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v2.0.22 (FreeBSD) > > iQIcBAEBCgAGBQJTQxJ1AAoJEJW2GBstM+nsz6AP/2m28eIzuF/JFhyZB7rkLAZR > vP9P0Tu1Vupwd6FN5X9m1O4t5ORhMfn5Y8SuxemHPg8NncaEptg43rs+TED4ucGd > ulyFLJsAZtCDlTTVRAuhp3PfvNllBcoG6a+sWg0qjDqxnzWpPZShCP8ay9g/3q4W > ceYJigXyi7KtKuNlc2YXlC5CA5NpKV9zsc0KhZj/PIq9qLiv+JYUriz1BRE8J+5P > CusO3usNgwHFx0XppMQRXxg/iSYnqs/YM6btENgsOBlRsCJkfSPbxE1z6Vmp0h27 > mOWiBLIOOR97WfYHCUHUHg+1bpJKz6VXUDHbNjjoaaLWg2D4HCkqgm45mgKZBHwh > 6SZUR90WthBbbFwJ3vY+wdARBO1V3RBg64ACZfYEIimqtGKZ5VaJgmYFLZc33RQr > O6Gpt7KeiwxaPYe/18zIiBULKeGBtQXettKpw4KOrkKSfnZePNxQIiqQmzLmfzXW > VwgRYlAAhjmv/ROCdnQJiKQKnloo9xUEPtk1ngmw6ThJJuDGS+Mcm1pWwbvMPF5/ > cWXprDXW4/Hws8GCXbZxYRrC0xQ0zDL+K589H/3pTWV5ijnI/CpM1gzvd0NH/H4+ > LQNILNJ+p2Uhp3D7yoz1bQC8gV2XeXROeNGEuY3VRyNbnv3z65mjWry/4QZo+kp6 > NcKVrUpKLG4odhL7BXBF > =7rU5 > -----END PGP SIGNATURE----- > -------------- next part -------------- > Index: crypto/openssl/ssl/d1_both.c > =================================================================== > --- crypto/openssl/ssl/d1_both.c (revision 264059) > +++ crypto/openssl/ssl/d1_both.c (working copy) > @@ -1458,26 +1458,36 @@ dtls1_process_heartbeat(SSL *s) > unsigned int payload; > unsigned int padding = 16; /* Use minimum padding */ > > + if (s->msg_callback) > + s->msg_callback(0, s->version, TLS1_RT_HEARTBEAT, > + &s->s3->rrec.data[0], s->s3->rrec.length, > + s, s->msg_callback_arg); > + > /* Read type and payload length first */ > + if (1 + 2 + 16 > s->s3->rrec.length) > + return 0; /* silently discard */ > hbtype = *p++; > n2s(p, payload); > + if (1 + 2 + payload + 16 > s->s3->rrec.length) > + return 0; /* silently discard per RFC 6520 sec. 4 */ > pl = p; > > - if (s->msg_callback) > - s->msg_callback(0, s->version, TLS1_RT_HEARTBEAT, > - &s->s3->rrec.data[0], s->s3->rrec.length, > - s, s->msg_callback_arg); > - > if (hbtype == TLS1_HB_REQUEST) > { > unsigned char *buffer, *bp; > + unsigned int write_length = 1 /* heartbeat type */ + > + 2 /* heartbeat length */ + > + payload + padding; > int r; > > + if (write_length > SSL3_RT_MAX_PLAIN_LENGTH) > + return 0; > + > /* Allocate memory for the response, size is 1 byte > * message type, plus 2 bytes payload length, plus > * payload, plus padding > */ > - buffer = OPENSSL_malloc(1 + 2 + payload + padding); > + buffer = OPENSSL_malloc(write_length); > bp = buffer; > > /* Enter response type, length and copy payload */ > @@ -1488,11 +1498,11 @@ dtls1_process_heartbeat(SSL *s) > /* Random padding */ > RAND_pseudo_bytes(bp, padding); > > - r = dtls1_write_bytes(s, TLS1_RT_HEARTBEAT, buffer, 3 + > payload + padding); > + r = dtls1_write_bytes(s, TLS1_RT_HEARTBEAT, buffer, > write_length); > > if (r >= 0 && s->msg_callback) > s->msg_callback(1, s->version, TLS1_RT_HEARTBEAT, > - buffer, 3 + payload + padding, > + buffer, write_length, > s, s->msg_callback_arg); > > OPENSSL_free(buffer); > Index: crypto/openssl/ssl/t1_lib.c > =================================================================== > --- crypto/openssl/ssl/t1_lib.c (revision 264059) > +++ crypto/openssl/ssl/t1_lib.c (working copy) > @@ -2486,16 +2486,20 @@ tls1_process_heartbeat(SSL *s) > unsigned int payload; > unsigned int padding = 16; /* Use minimum padding */ > > + if (s->msg_callback) > + s->msg_callback(0, s->version, TLS1_RT_HEARTBEAT, > + &s->s3->rrec.data[0], s->s3->rrec.length, > + s, s->msg_callback_arg); > + > /* Read type and payload length first */ > + if (1 + 2 + 16 > s->s3->rrec.length) > + return 0; /* silently discard */ > hbtype = *p++; > n2s(p, payload); > + if (1 + 2 + payload + 16 > s->s3->rrec.length) > + return 0; /* silently discard per RFC 6520 sec. 4 */ > pl = p; > > - if (s->msg_callback) > - s->msg_callback(0, s->version, TLS1_RT_HEARTBEAT, > - &s->s3->rrec.data[0], s->s3->rrec.length, > - s, s->msg_callback_arg); > - > if (hbtype == TLS1_HB_REQUEST) > { > unsigned char *buffer, *bp; > > ------------------------------ > > Message: 3 > Date: Mon, 07 Apr 2014 22:27:09 -0400 > From: Mike Tancsa <[email protected]> > To: [email protected], [email protected] > Subject: Re: http://heartbleed.com/ > Message-ID: <[email protected]> > Content-Type: text/plain; charset=ISO-8859-1; format=flowed > > On 4/7/2014 5:02 PM, Xin Li wrote: > > -----BEGIN PGP SIGNED MESSAGE----- > > Hash: SHA512 > > > > Hi, Thomas, > > > > On 04/07/14 13:49, Thomas Steen Rasmussen wrote: > >> Hello, > >> > >> http://heartbleed.com/ describes an openssl vulnerability > >> published today. We are going to need an advisory for the openssl > >> in base in FreeBSD 10 and we are also going to need an updated > >> port. > >> > >> The implications of this vulnerability are pretty massive, > >> certificates will need to be replaced and so on. I don't want to > >> repeat the page, so go read that. > > > > We are already working on this but building, reviewing, etc. would > > take some time. > > > > Hi, > The webpage lists > > FreeBSD 8.4 (OpenSSL 1.0.1e) and 9.1 (OpenSSL 1.0.1c) > > I take it this is only if you installed from the ports no ? > > ---Mike > > > > > -- > ------------------- > Mike Tancsa, tel +1 519 651 3400 > Sentex Communications, [email protected] > Providing Internet services since 1994 www.sentex.net > Cambridge, Ontario Canada http://www.tancsa.com/ > > > ------------------------------ > > Message: 4 > Date: Mon, 07 Apr 2014 19:29:18 -0700 > From: Xin Li <[email protected]> > To: Mike Tancsa <[email protected]>, [email protected], > [email protected] > Subject: Re: http://heartbleed.com/ > Message-ID: <[email protected]> > Content-Type: text/plain; charset=ISO-8859-1 > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > On 4/7/14, 7:27 PM, Mike Tancsa wrote: > > On 4/7/2014 5:02 PM, Xin Li wrote: > >> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 > >> > >> Hi, Thomas, > >> > >> On 04/07/14 13:49, Thomas Steen Rasmussen wrote: > >>> Hello, > >>> > >>> http://heartbleed.com/ describes an openssl vulnerability > >>> published today. We are going to need an advisory for the > >>> openssl in base in FreeBSD 10 and we are also going to need an > >>> updated port. > >>> > >>> The implications of this vulnerability are pretty massive, > >>> certificates will need to be replaced and so on. I don't want > >>> to repeat the page, so go read that. > >> > >> We are already working on this but building, reviewing, etc. > >> would take some time. > >> > > > > Hi, The webpage lists > > > > FreeBSD 8.4 (OpenSSL 1.0.1e) and 9.1 (OpenSSL 1.0.1c) > > > > I take it this is only if you installed from the ports no ? > > That's correct. OpenSSL shipped with the base system in these two > releases are not vulnerable because they don't support the extension. > > Cheers, > > -----BEGIN PGP SIGNATURE----- > > iQIcBAEBCgAGBQJTQ179AAoJEJW2GBstM+nsIa4P/RAXDidWzc01T2ghX4uNFtod > C2Wd2k2B6i24LcV3PPub6dQjRI9sMxh9Q/7bIqXctThJ41U9s44P7Zvf6T7Xh/LY > YM4FBAFKNiMC+WZsS78pGW6pYIULml66El7sb/G6DNOzjezWlD3MwnPo2S0nibQJ > BDJ0pU3BH0A2rvyDWmF7aAveJtEuFPCCovytadStHiFZk3nKMwdN0ariLVq8JFlU > s5uqf0rWRXuYIIJ2/Fv9XxUHWi0RrvyXojfdPVNIhEppmdswCzxyb+PLOBbWuZZp > 9ma/ELuo8VJmmsP2A0zX2PriejfFtTR7vXP8V3VwP8RvS2YRFH44Bmyllxn2eYYI > HbemABH2A5rCiMbEu32AGX7i1HikWScwKNIEJbK35BEIb9g3UGRFuxeRw9J6mTyd > 44hMRO1YeyHv/nuSQ+g+d+nzB1dBYSq7YbG5UAPs0v+5fbnoPTU/28olKx1br83H > BZdO+y8VUppNnRWL2wvnsbd1M8/nGABNBD9tco9ftlN0jUpFtSXkPEt20JWwZS/l > HiD328EnTJKgB5nllizsCDIgaTDUYMeH6Bf8QJ54t+Cfu6sS1YYCv2/ycu5tKfqv > yRU6ypV82kye/fRBkFj4JwCOXcPozm+9uPAG9bk1355w+EyKmMrba79BvwtQ+uUj > PXJpfmZifPnNDBTXrg2d > =FDDO > -----END PGP SIGNATURE----- > > > ------------------------------ > > Message: 5 > Date: Mon, 07 Apr 2014 21:41:25 -0500 > From: Bryan Drewery <[email protected]> > To: [email protected] > Subject: Re: http://heartbleed.com/ > Message-ID: <[email protected]> > Content-Type: text/plain; charset="iso-8859-1" > > On 4/7/2014 3:49 PM, Thomas Steen Rasmussen wrote: > > Hello, > > > > http://heartbleed.com/ describes an openssl vulnerability published > > today. We are going to need an advisory for the openssl in base in > > FreeBSD 10 and we are also going to need an updated port. > > > > The implications of this vulnerability are pretty massive, > > certificates will need to be replaced and so on. I don't want to > > repeat the page, so go read that. > > > > Best regards, > > > > > > /Thomas Steen Rasmussen > > > > ps. there is a bit on the openssl site too: > > https://www.openssl.org/news/secadv_20140407.txt > > The port has been updated. 1.0.1_10 has the fix. > > -- > Regards, > Bryan Drewery > > -------------- next part -------------- > A non-text attachment was scrubbed... > Name: signature.asc > Type: application/pgp-signature > Size: 553 bytes > Desc: OpenPGP digital signature > URL: < > http://lists.freebsd.org/pipermail/freebsd-security/attachments/20140407/07e15f81/attachment-0001.sig > > > > ------------------------------ > > Subject: Digest Footer > > _______________________________________________ > [email protected] mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-security > To unsubscribe, send any mail to "[email protected] > " > > ------------------------------ > > End of freebsd-security Digest, Vol 482, Issue 1 > ************************************************ > _______________________________________________ [email protected] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "[email protected]"







like.gif 您可能會有興趣的文章
icon.png[問題/行為] 貓晚上進房間會不會有憋尿問題
icon.pngRe: [閒聊] 選了錯誤的女孩成為魔法少女 XDDDDDDDDDD
icon.png[正妹] 瑞典 一張
icon.png[心得] EMS高領長版毛衣.墨小樓MC1002
icon.png[分享] 丹龍隔熱紙GE55+33+22
icon.png[問題] 清洗洗衣機
icon.png[尋物] 窗台下的空間
icon.png[閒聊] 双極の女神1 木魔爵
icon.png[售車] 新竹 1997 march 1297cc 白色 四門
icon.png[討論] 能從照片感受到攝影者心情嗎
icon.png[狂賀] 賀賀賀賀 賀!島村卯月!總選舉NO.1
icon.png[難過] 羨慕白皮膚的女生
icon.png閱讀文章
icon.png[黑特]
icon.png[問題] SBK S1安裝於安全帽位置
icon.png[分享] 舊woo100絕版開箱!!
icon.pngRe: [無言] 關於小包衛生紙
icon.png[開箱] E5-2683V3 RX480Strix 快睿C1 簡單測試
icon.png[心得] 蒼の海賊龍 地獄 執行者16PT
icon.png[售車] 1999年Virage iO 1.8EXi
icon.png[心得] 挑戰33 LV10 獅子座pt solo
icon.png[閒聊] 手把手教你不被桶之新手主購教學
icon.png[分享] Civic Type R 量產版官方照無預警流出
icon.png[售車] Golf 4 2.0 銀色 自排
icon.png[出售] Graco提籃汽座(有底座)2000元誠可議
icon.png[問題] 請問補牙材質掉了還能再補嗎?(台中半年內
icon.png[問題] 44th 單曲 生寫竟然都給重複的啊啊!
icon.png[心得] 華南紅卡/icash 核卡
icon.png[問題] 拔牙矯正這樣正常嗎
icon.png[贈送] 老莫高業 初業 102年版
icon.png[情報] 三大行動支付 本季掀戰火
icon.png[寶寶] 博客來Amos水蠟筆5/1特價五折
icon.pngRe: [心得] 新鮮人一些面試分享
icon.png[心得] 蒼の海賊龍 地獄 麒麟25PT
icon.pngRe: [閒聊] (君の名は。雷慎入) 君名二創漫畫翻譯
icon.pngRe: [閒聊] OGN中場影片:失蹤人口局 (英文字幕)
icon.png[問題] 台灣大哥大4G訊號差
icon.png[出售] [全國]全新千尋侘草LED燈, 水草
伺服器連線錯誤,造成您的不便還請多多包涵!
「贊助商連結」






like.gif 您可能會有興趣的文章
icon.png[問題/行為] 貓晚上進房間會不會有憋尿問題
icon.pngRe: [閒聊] 選了錯誤的女孩成為魔法少女 XDDDDDDDDDD
icon.png[正妹] 瑞典 一張
icon.png[心得] EMS高領長版毛衣.墨小樓MC1002
icon.png[分享] 丹龍隔熱紙GE55+33+22
icon.png[問題] 清洗洗衣機
icon.png[尋物] 窗台下的空間
icon.png[閒聊] 双極の女神1 木魔爵
icon.png[售車] 新竹 1997 march 1297cc 白色 四門
icon.png[討論] 能從照片感受到攝影者心情嗎
icon.png[狂賀] 賀賀賀賀 賀!島村卯月!總選舉NO.1
icon.png[難過] 羨慕白皮膚的女生
icon.png閱讀文章
icon.png[黑特]
icon.png[問題] SBK S1安裝於安全帽位置
icon.png[分享] 舊woo100絕版開箱!!
icon.pngRe: [無言] 關於小包衛生紙
icon.png[開箱] E5-2683V3 RX480Strix 快睿C1 簡單測試
icon.png[心得] 蒼の海賊龍 地獄 執行者16PT
icon.png[售車] 1999年Virage iO 1.8EXi
icon.png[心得] 挑戰33 LV10 獅子座pt solo
icon.png[閒聊] 手把手教你不被桶之新手主購教學
icon.png[分享] Civic Type R 量產版官方照無預警流出
icon.png[售車] Golf 4 2.0 銀色 自排
icon.png[出售] Graco提籃汽座(有底座)2000元誠可議
icon.png[問題] 請問補牙材質掉了還能再補嗎?(台中半年內
icon.png[問題] 44th 單曲 生寫竟然都給重複的啊啊!
icon.png[心得] 華南紅卡/icash 核卡
icon.png[問題] 拔牙矯正這樣正常嗎
icon.png[贈送] 老莫高業 初業 102年版
icon.png[情報] 三大行動支付 本季掀戰火
icon.png[寶寶] 博客來Amos水蠟筆5/1特價五折
icon.pngRe: [心得] 新鮮人一些面試分享
icon.png[心得] 蒼の海賊龍 地獄 麒麟25PT
icon.pngRe: [閒聊] (君の名は。雷慎入) 君名二創漫畫翻譯
icon.pngRe: [閒聊] OGN中場影片:失蹤人口局 (英文字幕)
icon.png[問題] 台灣大哥大4G訊號差
icon.png[出售] [全國]全新千尋侘草LED燈, 水草

請輸入看板名稱,例如:Soft_Job站內搜尋

TOP