USN-2914-1 OpenSSL vulnerabilities
Severity
Low
Vendor
Ubuntu, OpenSSL
Versions Affected
- Ubuntu 14.04 LTS
- SSLv1
Description
Several security issues were fixed in OpenSSL.
Yuval Yarom, Daniel Genkin, and Nadia Heninger discovered that OpenSSL was vulnerable to a side-channel attack on modular exponentiation. On certain CPUs, a local attacker could possibly use this issue to recover RSA keys. This flaw is known as CacheBleed. (CVE-2016-0702)
Adam Langley discovered that OpenSSL incorrectly handled memory when parsing DSA private keys. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-0705)
Guido Vranken discovered that OpenSSL incorrectly handled hex digit calculation in the BN_hex2bn function. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-0797)
Emilia Käsper discovered that OpenSSL incorrectly handled memory when performing SRP user database lookups. A remote attacker could possibly use this issue to cause OpenSSL to consume memory, resulting in a denial of service. (CVE-2016-0798)
Guido Vranken discovered that OpenSSL incorrectly handled memory when printing very long strings. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-0799)
Affected VMware Products and Versions
Severity is low unless otherwise noted.
- All versions of Cloud Foundry rootfs prior to 1.39.0 AND stemcell 3146.x versions prior to 3146.10 AND all other stemcell versions prior to 3213
- Pivotal Redis 1.4.x versions prior to 1.4.21 AND 1.5.x versions prior to 1.5.10
- Pivotal Ops Manager 1.5.x versions prior to 1.5.17 AND 1.6.x versions prior to 1.6.12
- Pivotal Elastic Runtime 1.5.x versions prior to 1.5.17 AND 1.6.x versions prior to 1.6.18
- Pivotal RabbitMQ 1.5.x versions prior to 1.5.8
- Pivotal Push Notification Service 1.4.x versions prior to 1.4.3
- Pivotal Ops Metrics 1.6.x versions prior to 1.6.10
- Pivotal Single Sign On 1.0.x versions prior to 1.0.10
- Pivotal Spring Cloud Services 1.0.x versions prior to 1.0.7
- Pivotal MySQL 1.6.x versions prior to 1.6.9 AND 1.7.x versions prior to 1.7.6 AND edge release versions prior to 1.8.0-edge.3
Mitigation
Users of affected versions should apply the following mitigation:
- The Cloud Foundry project recommends that Cloud Foundry deployments upgrade rootfs to version 1.39.0 or later
- The Cloud Foundry project recommends that Cloud Foundry deployments upgrade stemcell versions 3146.x to 3146.10 or later OR all other stemcell versions to 3213 or later
- Upgrade Pivotal Redis 1.4.x versions to 1.4.21 or later OR 1.5.x versions to 1.5.10 or later
- Upgrade Pivotal Ops Manager 1.5.x versions to 1.5.17 or later OR 1.6.x versions to 1.6.12 or later
- Upgrade Pivotal Elastic Runtime 1.5.x versions to 1.5.17 or later OR 1.6.x versions to 1.6.18 or later
- Upgrade Pivotal RabbitMQ 1.5.x versions to 1.5.8 or later
- Upgrade Pivotal Push Notification Service 1.4.x versions to 1.4.3 or later
- Upgrade Pivotal Ops Metrics 1.6.x versions to 1.6.10 or later
- Upgrade Pivotal Single Sign On 1.0.x versions to 1.0.10 or later
- Upgrade Pivotal Spring Cloud Services 1.0.x versions to 1.0.7 or later
- Upgrade Pivotal MySQL to 1.6.9 or later 1.6.x versions OR 1.7.x versions to 1.7.6 or later OR edge versions 1.8.0-edge.3 or later
Credit
Daniel Genkin, Nadia Heninger, Emilia Käsper, Adam Langley, Guido Vranken, Yuval Yarom
References
- http://www.ubuntu.com/usn/usn-2914-1
- http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0702.html
- http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0705.html
- http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0797.html
- http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0798.html
- http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0799.html
- https://network.tanzu.vmware.com