GLSA Advocate

Joined: 12 May 2004 Posts: 2663
|
Posted: Tue Apr 08, 2014 11:26 am Post subject: [ GLSA 201404-07 ] OpenSSL: Information Disclosure |
|
|
Gentoo Linux Security Advisory
Title: OpenSSL: Information Disclosure (GLSA 201404-07)
Severity: normal
Exploitable: remote
Date: April 08, 2014
Updated: July 07, 2014
Bug(s): #505278, #507074
ID: 201404-07
Synopsis
Multiple Information Disclosure vulnerabilities in OpenSSL allow
remote attackers to obtain sensitive information via various vectors.
Background
OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer
(SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general
purpose cryptography library.
Affected Packages
Package: dev-libs/openssl
Vulnerable: < 1.0.1g
Unaffected: >= 1.0.1g
Unaffected: >= 0.9.8y < 0.9.9
Unaffected: >= 0.9.8z_p1 < 0.9.9
Unaffected: >= 0.9.8z_p2 < 0.9.9
Unaffected: >= 0.9.8z_p3 < 0.9.9
Unaffected: >= 0.9.8z_p4 < 0.9.9
Unaffected: >= 0.9.8z_p5 < 0.9.9
Architectures: All supported architectures
Description
Multiple vulnerabilities have been found in OpenSSL: - OpenSSL incorrectly handles memory in the TLS heartbeat extension,
leading to information disclosure of 64kb per request, possibly
including private keys (“Heartbleed bug”, OpenSSL 1.0.1 only,
CVE-2014-0160).
- The Montgomery ladder implementation of OpenSSL improperly handles
swap operations (CVE-2014-0076).
Impact
A remote attacker could exploit these issues to disclose information,
including private keys or other sensitive information, or perform
side-channel attacks to obtain ECDSA nonces.
Workaround
Disabling the tls-heartbeat USE flag (enabled by default) provides a
workaround for the CVE-2014-0160 issue.
Resolution
All OpenSSL users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.1g"
| Note: All services using OpenSSL to provide TLS connections have to be
restarted for the update to take effect. Utilities like
app-admin/lib_users can aid in identifying programs using OpenSSL.
As private keys may have been compromised using the Heartbleed attack,
it is recommended to regenerate them.
References
CVE-2014-0076
CVE-2014-0160
Heartbleed bug website
Last edited by GLSA on Tue Jul 08, 2014 4:31 am; edited 4 times in total |
|