Severity
Low
Vendor
Ubuntu, OpenSSL
Versions Affected
- Ubuntu 14.04 LTS
- SSLv1
Description
Several security issues were fixed in OpenSSL.
Yuval Yarom, Daniel Genkin, and Nadia Heninger discovered that OpenSSL was vulnerable to a side-channel attack on modular exponentiation. On certain CPUs, a local attacker could possibly use this issue to recover RSA keys. This flaw is known as CacheBleed. (CVE-2016-0702)
Adam Langley discovered that OpenSSL incorrectly handled memory when parsing DSA private keys. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-0705)
Guido Vranken discovered that OpenSSL incorrectly handled hex digit calculation in the BN_hex2bn function. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-0797)
Emilia Käsper discovered that OpenSSL incorrectly handled memory when performing SRP user database lookups. A remote attacker could possibly use this issue to cause OpenSSL to consume memory, resulting in a denial of service. (CVE-2016-0798)
Guido Vranken discovered that OpenSSL incorrectly handled memory when printing very long strings. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-0799)
Affected Products and Versions
Severity is low unless otherwise noted.
- All versions of Cloud Foundry rootfs prior to 1.39.0 AND stemcell 3146.x versions prior to 3146.10 AND all other stemcell versions prior to 3213
Mitigation
Users of affected versions should apply the following mitigation:
- The Cloud Foundry project recommends that Cloud Foundry deployments upgrade rootfs to version 1.39.0 or later
- The Cloud Foundry project recommends that Cloud Foundry deployments upgrade stemcell versions 3146.x to 3146.10 or later OR all other stemcell versions to 3213 or later
Credit
Daniel Genkin, Nadia Heninger, Emilia Käsper, Adam Langley, Guido Vranken, Yuval Yarom
References
- http://www.ubuntu.com/usn/usn-2914-1
- http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0702.html
- http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0705.html
- http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0797.html
- http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0798.html
- http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0799.html