Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 19 Apr 2024 15:11:51 +0000
From:      "Wall, Stephen" <stephen.wall@redcom.com>
To:        "freebsd-security@freebsd.org" <freebsd-security@freebsd.org>
Subject:   RE: FreeBSD Security Advisory FreeBSD-SA-24:03.unbound
Message-ID:  <MW4PR09MB928443FF56B90D1C644AE493EE0D2@MW4PR09MB9284.namprd09.prod.outlook.com>
In-Reply-To: <20240328075102.10441343C@freefall.freebsd.org>

index | next in thread | previous in thread | raw e-mail

> FreeBSD-SA-24:03.unbound                                    Security Advisory
> 
> Topic:          Multiple vulnerabilities in unbound

Since upgrading to p6 in response to this SA, we've found that kinit has started
failing for us. This looks to be due to aaf2c7fdb8 [1], when it attempts to load
the legacy OpenSSL provider, which we do not install on our systems.
Furthermore, it loads the default provider as well, which we specifically do not
load when systems are configured for FIPS operation.

What is our exposure if we simple revert this commit?  Are there any CVE's
associated with it?  Is there a way to disable the ciphers at build time that
can trigger the segfaults?

Or am I on my own resolving this because we do not use the legacy provider (I.e.
not a default system)?

Thanks for your consideration.

- Steve Wall

[1] https://cgit.freebsd.org/src/commit/?h=releng/14.0&id=aaf2c7fdb81a1dd9de9fc77c9313f4e60e68fa76

home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?MW4PR09MB928443FF56B90D1C644AE493EE0D2>