Created attachment 180217 [details] patch Changelog: * An integer underflow leading to an out of bounds read flaw was found in OpenSSL. A remote attacker could possibly use this flaw to crash a 32-bit TLS/SSL server or client using OpenSSL if it used the RC4-MD5 cipher suite. (CVE-2017-3731) * A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections form other clients. (CVE-2016-8610) Link: https://rhn.redhat.com/errata/RHSA-2017-0286.html Builds fine on Poudriere on 10.3-RELEASE.
A commit references this bug: Author: tijl Date: Wed Feb 22 16:27:44 UTC 2017 New revision: 434593 URL: https://svnweb.freebsd.org/changeset/ports/434593 Log: Update to 1.0.1e-60.el7_3.1 PR: 217295 Submitted by: Piotr Kubaj <pkubaj@anongoth.pl> MFH: 2017Q1 Security: https://rhn.redhat.com/errata/RHSA-2017-0286.html Changes: head/security/linux-c7-openssl/Makefile head/security/linux-c7-openssl/distinfo
A commit references this bug: Author: tijl Date: Fri Feb 24 12:24:22 UTC 2017 New revision: 434709 URL: https://svnweb.freebsd.org/changeset/ports/434709 Log: MFH: r434593 Update to 1.0.1e-60.el7_3.1 PR: 217295 Submitted by: Piotr Kubaj <pkubaj@anongoth.pl> Security: https://rhn.redhat.com/errata/RHSA-2017-0286.html Approved by: ports-secteam (junovitch) Changes: _U branches/2017Q1/ branches/2017Q1/security/linux-c7-openssl/Makefile branches/2017Q1/security/linux-c7-openssl/distinfo.i386 branches/2017Q1/security/linux-c7-openssl/distinfo.x86_64 branches/2017Q1/security/linux-c7-openssl/pkg-plist.i386 branches/2017Q1/security/linux-c7-openssl/pkg-plist.x86_64