OpenSSL Advisory: September 22nd 2016

OpenSSL have published a security advisory. Here's how it affects BoringSSL:

CVESummarySeverity in OpenSSLImpact to BoringSSL
CVE-2016-6304OCSP Status Request extension unbounded memory growthHighNot affected; buggy code was removed.
CVE-2016-6305SSL_peek() hang on empty recordModerateNot affected; regression introduced after fork. (Added test anyway.)
CVE-2016-2183SWEET32 MitigationLowNot practical to do anything right now or of much interest (bulk ciphers do not affect downgrade and HIGH/MEDIUM aren't useful APIs for server operators).
CVE-2016-6303OOB write in MDC2_UpdateLowNot affected; buggy code was removed.
CVE-2016-6302Malformed SHA512 ticket DoSLowNot affected; independently fixed in April 2015.
CVE-2016-2182OOB write in BN_bn2decLowFix imported August 2016 (and then rewritten).
CVE-2016-2180OOB read in TS_OBJ_print_bioLowNot affected; buggy code was removed.
CVE-2016-2177Pointer arithmetic undefined behaviorLowNot affected; buggy code was rewritten.
CVE-2016-2178Constant time flag not preserved in DSA signingLowFix imported June 2016.
CVE-2016-2179DTLS buffered message DoSLowNot affected; buggy code was removed.
CVE-2016-2181DTLS replay protection DoSLowNot affected; buggy code was removed.
CVE-2016-6306Certificate message OOB readsLowNot affected; buggy code was rewritten.
CVE-2016-6307Excessive allocation of memory on TLS messagesLowNot affected; regression introduced after fork.
CVE-2016-6308Excessive allocation of memory on DTLS messagesLowNot affected; regression introduced after fork.