Kenneth R Westerback | 4 May 01:05 2016
Picon

DuckDuckGo is 2016 Gold Level Contributor to the OpenBSD Foundation

The OpenBSD Foundation is happy to announce that DuckDuckGo has
become the first Gold level contributor to the Foundation's 2016
fundraising campaign.

This donation is part DuckDuckGo's annual initiative to help fund
free and open source projects based on nominations from their
community.

Donations to the Foundation can be made on our Donations Page at

www.openbsdfoundation.org/donations.html

We can be contacted regarding corporate sponsorship at

fundraising <at> openbsdfoundation.org.

Ted Unangst | 3 May 16:32 2016

libcrypto errata

OpenSSL announced several issues today that also affect LibreSSL.

- Memory corruption in the ASN.1 encoder (CVE-2016-2108)
- Padding oracle in AES-NI CBC MAC check (CVE-2016-2107)
- EVP_EncodeUpdate overflow (CVE-2016-2105)
- EVP_EncryptUpdate overflow (CVE-2016-2106)
- ASN.1 BIO excessive memory allocation (CVE-2016-2109)

Thanks to OpenSSL for providing information and patches.

Refer to https://www.openssl.org/news/secadv/20160503.txt

Patches for OpenBSD are available:

http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/005_crypto.patch.sig

http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/013_crypto.patch.sig

Stuart Henderson | 1 May 15:37 2016
Picon

OpenBSD 5.9 errata 004

A problem in m_dup_pkt() can result in kernel crashes with carp(4).
Only 5.9 is affected.

A patch is available:

http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/004_mbuf.patch.sig

Brent Cook | 30 Mar 06:18 2016
Picon
Gravatar

OpenNTPD 5.9p1 released

OpenNTPD 5.9p1 has just been released. t will be available from the
mirrors listed at http://www.openntpd.org/ shortly.

OpenNTPD is a FREE, secure, and easy to use implementation of the
Network Time Protocol. It provides the ability to sync the local clock
to remote NTP servers and can act as NTP server itself, redistributing
the local clock.

Changes since OpenNTPD 5.7p4
============================
* When a single "constraint" is specified, try all returned addresses
  until one succeeds, rather than the first returned address.
* Relaxed the constraint error margin to be proportional to the number
  of NTP peers, avoid constant reconnections when there is a bad NTP
  peer.
* Removed disabled hotplug sensor support.
* Added support for detecting crashes in constraint subprocesses.
* Moved the execution of constraints from the ntp process to the
  parent process, allowing for better privilege separation since the
  ntp process can be further restricted.
* Added pledge(2) support.
* Updated to require LibreSSL 2.3.2 or greater.
* Fixed high CPU usage when the network is down.
* Fixed various memory leaks.
* Switched to RMS for jitter calculations.
* Unified logging functions with other OpenBSD base programs.

OpenNTPD portable-specific changes:

* Added support for syncing time with the Realtime Clock (RTC) on OSes
(Continue reading)

Theo de Raadt | 29 Mar 20:05 2016
Picon

OpenBSD 5.9 released - March 29


------------------------------------------------------------------------
- OpenBSD 5.9 RELEASED -------------------------------------------------

March 29, 2016.

We are pleased to announce the official release of OpenBSD 5.9.
This is our 39th release on CD-ROM (and 40th via FTP/HTTP).  We remain
proud of OpenBSD's record of more than twenty years with only two remote
holes in the default install.

As in our previous releases, 5.9 provides significant improvements,
including new features, in nearly all areas of the system:

 - Processor support, including:
    o W^X policy enforced in the i386 kernel address space.

 - Improved hardware support, including:
    o New asmc(4) driver for the Apple System Management Controller.
    o New pchtemp(4) driver for the thermal sensor found on Intel X99,
      C610 series, 9 series and 100 series PCH.
    o New uonerng(4) driver for the Moonbase Otago OneRNG.
    o New dwiic(4) driver for the Synopsys DesignWare I2C controller.
    o New ikbd(4), ims(4), and imt(4) drivers for HID-over-i2c
      keyboards, mice and multitouch touchpads.
    o New efifb(4) driver for EFI frame buffer.
    o New viocon(4) driver for the virtio(4) console interface provided
      by KVM, QEMU, and others.
    o New xen(4) driver implementing Xen domU initialization and PVHVM
      device attachment.
(Continue reading)

Brent Cook | 23 Mar 06:07 2016
Picon
Gravatar

LibreSSL 2.3.3 Released

We have released LibreSSL 2.3.3, which will be arriving in the LibreSSL
directory of your local OpenBSD mirror soon.

This release marks the beginning of stable 2.3.x branch, with all
API/ABI changes now moving to the 2.4.x development branch. LibreSSL 2.3.3
is identical to the version that will be shipped with OpenBSD 5.9 in May
2016.

LibreSSL 2.3.3 includes the following improvements from 2.3.2:

  * Reworked build scripts to better sync with OpenNTPD-portable.

  * Fixed an nginx compatibility issue by adding an 'install_sw' build target.

  * Fixed some broken manpage links in the install target.

  * Fixed HP-UX builds with nc(1).

  * Changed the default configuration directory to c:\LibreSSL\ssl on Windows
    binary builds, making it easier to configure CA certificates.

  * cert.pem has been reorganized and synced with Mozilla's certificate store.

Damien Miller | 10 Mar 13:12 2016

OpenSSH Security Advisory: xauth command injection


OpenSSH Security Advisory: x11fwd.adv

This document may be found at: http://www.openssh.com/txt/x11fwd.adv

1. Affected configurations

        All versions of OpenSSH prior to 7.2p2 with X11Forwarding
	enabled.

2. Vulnerability

	Missing sanitisation of untrusted input allows an
	authenticated user who is able to request X11 forwarding
	to inject commands to xauth(1).

	Injection of xauth commands grants the ability to read
	arbitrary files under the authenticated user's privilege,
	Other xauth commands allow limited information leakage,
	file overwrite, port probing and generally expose xauth(1),
	which was not written with a hostile user in mind, as an
	attack surface.

	xauth(1) is run under the user's privilege, so this
	vulnerability offers no additional access to unrestricted
	accounts, but could circumvent key or account restrictions
	such as sshd_config ForceCommand, authorized_keys
	command="..." or restricted shells.

3. Mitigation
(Continue reading)

Brent Cook | 29 Jan 00:33 2016
Picon
Gravatar

LibreSSL 2.3.2, 2.2.6, and 2.1.10 released

We have released a number of LibreSSL updates, which will be arriving in
the LibreSSL directory of your local OpenBSD mirror soon.

LibreSSL 2.2.6 and 2.1.10 contain a single change to deprecate use of
the SSL_OP_SINGLE_DH_USE flag. It is now enabled unconditionally.
Thanks to Antonio Sanso for the report.

LibreSSL 2.3.2, a snapshot release, contains the latest developments
from the OpenBSD 5.9 branch. It also contains ABI/API changes, which
will stabilize once OpenBSD 5.9 is completed. At that time, LibreSSL
2.3.x and 2.2.x will become the stable release branches, and we will
drop support for the 2.1.x branch.

LibreSSL 2.3.2 also has the following notable changes:

    * Changed format of LIBRESSL_VERSION_NUMBER to match that of
      OPENSSL_VERSION_NUMBER, see:
      https://wiki.openssl.org/index.php/Manual:OPENSSL_VERSION_NUMBER(3)

    * Added EVP_aead_chacha20_poly1305_ietf() which matches the AEAD
      construction introduced in RFC 7539, which is different than that
      already used in TLS with EVP_aead_chacha20_poly1305()

    * Avoid a potential undefined C99+ behavior due to shift overflow in
      AES_decrypt, reported by Pascal Cuoq <cuoq at trust-in-soft.com>

    * More man pages converted from pod to mdoc format

    * Added COMODO RSA Certification Authority and QuoVadis
      root certificates to cert.pem
(Continue reading)

Ted Unangst | 15 Jan 23:01 2016

ssh roaming

Qualys Security identified vulnerabilities in the ssh client roaming feature.
In the default configuration, this could potentially leak client keys to a
hostile server.

https://www.qualys.com/2016/01/14/cve-2016-0777-cve-2016-0778/openssh-cve-2016-0777-cve-2016-0778.txt

There are patches to disable the roaming feature, and it has been removed from
the source tree.

Brent Cook | 8 Dec 04:20 2015
Picon
Gravatar

LibreSSL 2.2.5 and 2.1.9 released

We have released LibreSSL 2.2.5 and 2.1.9, which will be arriving in the
LibreSSL directory of your local OpenBSD mirror soon.

This release is based on the stable OpenBSD 5.8 and 5.7 branches, which
include two fixes from the Dec 3, 2015 OpenSSL release:

  - CVE-2015-3194 - NULL pointer dereference in client side certificate
                    validation.
  - CVE-2015-3195 - Memory leak in PKCS7 - not reachable from TLS/SSL.

* The following OpenSSL CVEs did not apply to LibreSSL

  - CVE-2015-3193 - Carry propagating bug in the x86_64 Montgomery
                    squaring procedure.
  - CVE-2015-3196 - Double free race condition of the identify hint data.

We will release an update to the development 2.3.x branch later in a
separate announcement.

The LibreSSL project continues improvement of the codebase to reflect modern,
safe programming practices. We welcome feedback and improvements from the
broader community. Thanks to all of the contributors who helped make this
release possible.

Bob Beck | 4 Dec 07:01 2015
Picon

OpenBSD errata, Dec 3, 2015


Four new OpenSSL CVE's were released today, which OpenSSL deemed to be
not of sufficient severity to warrant advance disclosure.

OpenBSD/LibreSSL is not vulnerable to two of these CVE's.

CVE-2015-1393: Recently introduced in OpenSSL only. We did not merge
this because it gave miod <at>  a bad feeling.

CVE-2015-1394: NULL pointer dereference in client side certificate
validation. It was reported to OpenSSL on Aug 27, 2015, and kept
secret from the community until Dec 3, 2015 by OpenSSL and the
reporter of the bug.

CVE-2015-1395: Memory leak in PKCS7 - not reachable from TLS/SSL

CVE-2015-1396: String handling bug in code we deleted long ago, using
a function that all uses of which were flensed from LibreSSL shortly
after it's creation.

Fixes have been commited for both CVE-2015-1394 and CVE-2015-1395.
CVE-2015-1394 warrants an errata.

The errata for CVE-2015-1394 is available for OpenBSD 5.8 and OpenBSD
5.7 from the master site as well as the mirrors:

http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/009_clientcert.patch.sig
http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/021_clientcert.patch.sig

(Continue reading)


Gmane