FS#49616 - [openssl] CVE-2016-2178
Attached to Project:
Arch Linux
Opened by James Pic (is_null) - Wednesday, 08 June 2016, 09:44 GMT
Last edited by Levente Polyak (anthraxx) - Thursday, 22 September 2016, 18:10 GMT
Opened by James Pic (is_null) - Wednesday, 08 June 2016, 09:44 GMT
Last edited by Levente Polyak (anthraxx) - Thursday, 22 September 2016, 18:10 GMT
|
Details
Description:
<<In this work we disclose a vulnerability in OpenSSL, affecting all versions and forks (e.g. LibreSSL and BoringSSL) since roughly October 2005, which renders the implementation of the DSA signature scheme vulnerable to cache-based side-channel attacks. Exploiting the software defect, we demonstrate the first published cache-based key-recovery attack on these protocols: 260 SSH-2 handshakes to extract a 1024/160-bit DSA host key from an OpenSSH server, and 580 TLS 1.2 handshakes to extract a 2048/256-bit DSA key from an stunnel server.>> http://eprint.iacr.org/2016/594 Resolution: https://github.com/openssl/openssl/commit/b7d0f2834e139a20560d64c73e2565e93715ce2b https://github.com/openssl/openssl/commit/621eaf49a289bfac26d4cbcdb7396e796784c534 |
This task depends upon
Closed by Levente Polyak (anthraxx)
Thursday, 22 September 2016, 18:10 GMT
Reason for closing: Fixed
Additional comments about closing: fixed in 1.0.2.i-1
Thursday, 22 September 2016, 18:10 GMT
Reason for closing: Fixed
Additional comments about closing: fixed in 1.0.2.i-1
https://github.com/openssl/openssl/commit/a004e72b95835136d3f1ea90517f706c24c03da7
lib32-openssl.PKGBUILD (2.8 KiB)
I've added those patches as local files instead of the proposed way (with clearer file-names). If there are no strong objections I would be happy to push them to [testing]. 0 work for you :)
well I wouldn't call this a non-issue :) CVE-2016-2178 is an exploitable side-channel attack, however in MITRE CVE score and openssl security policy its considered a low severity issue as its (most likely) hard to pull off and also requires adjacent network access. So the access complexity is quite high but the damage is still bad as it allows extracting secret data. this kind of issues don't automatically trigger an openssl release itself as it most likely can't be pulled off from any arbitrary remote client without adjacent network access.
CVE-2016-2177 is an integer overflow problem that has medium severity for both, MITRE (5.8/10) and also openssl. Normally such problems will be kept private and collected until the next release, its not clear why it was already public.
The openssl model itself only issues immediate releases when (according to their security model) there are critical or high severity issues. Why those two problems were not kept private, as they themselves recommend, is not really clear. Most of the time the moderate issues were either collected privately or found together with critical issues that triggered an immediate releases. This time nothing triggered such release yet but unfortunately those findings are publicly known beforehand.