Joined: 12 May 2004
|Posted: Tue Apr 08, 2014 11:26 am Post subject: [ GLSA 201404-07 ] OpenSSL: Information Disclosure
|Gentoo Linux Security Advisory
Title: OpenSSL: Information Disclosure (GLSA 201404-07)
Date: April 08, 2014
Updated: July 07, 2014
Bug(s): #505278, #507074
Multiple Information Disclosure vulnerabilities in OpenSSL allow
remote attackers to obtain sensitive information via various vectors.
OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer
(SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general
purpose cryptography library.
Vulnerable: < 1.0.1g
Unaffected: >= 1.0.1g
Unaffected: >= 0.9.8y < 0.9.9
Unaffected: >= 0.9.8z_p1 < 0.9.9
Unaffected: >= 0.9.8z_p2 < 0.9.9
Unaffected: >= 0.9.8z_p3 < 0.9.9
Unaffected: >= 0.9.8z_p4 < 0.9.9
Unaffected: >= 0.9.8z_p5 < 0.9.9
Architectures: All supported architectures
Multiple vulnerabilities have been found in OpenSSL:
- OpenSSL incorrectly handles memory in the TLS heartbeat extension,
leading to information disclosure of 64kb per request, possibly
including private keys (“Heartbleed bug”, OpenSSL 1.0.1 only,
- The Montgomery ladder implementation of OpenSSL improperly handles
swap operations (CVE-2014-0076).
A remote attacker could exploit these issues to disclose information,
including private keys or other sensitive information, or perform
side-channel attacks to obtain ECDSA nonces.
Disabling the tls-heartbeat USE flag (enabled by default) provides a
workaround for the CVE-2014-0160 issue.
All OpenSSL users should upgrade to the latest version:
Note: All services using OpenSSL to provide TLS connections have to be
|# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.1g"
restarted for the update to take effect. Utilities like
app-admin/lib_users can aid in identifying programs using OpenSSL.
As private keys may have been compromised using the Heartbleed attack,
it is recommended to regenerate them.
Heartbleed bug website
Last edited by GLSA on Tue Jul 08, 2014 4:31 am; edited 4 times in total