Want to subscribe to topics you're interested in?
Become a Member

Security OpenSSL 1.0.2a, 1.0.1m, 1.0.0r & 0.9.8zf coming soon

Discussion in 'CentOS, Redhat & Oracle Linux News' started by eva2000, Mar 17, 2015.

  1. eva2000

    eva2000 Administrator Staff Member

    54,070
    12,176
    113
    May 24, 2014
    Brisbane, Australia
    Ratings:
    +18,734
    Local Time:
    2:45 AM
    Nginx 1.27.x
    MariaDB 10.x/11.4+
    OpenSSL 1.0.2a, 1.0.1m, 1.0.0r & 0.9.8zf high severity security fixes are being released on March 19th according to [openssl-announce] Forthcoming OpenSSL releases !


     
  2. eva2000

    eva2000 Administrator Staff Member

    54,070
    12,176
    113
    May 24, 2014
    Brisbane, Australia
    Ratings:
    +18,734
    Local Time:
    2:45 AM
    Nginx 1.27.x
    MariaDB 10.x/11.4+
    For Centmin Mod LEMP stack, there's 2 parts to updating OpenSSL - system YUM package back ported update + Nginx OpenSSL static compilation for front facing Nginx server and https/SSL. Updating to OpenSSL 1.0.2a is the exact same approach as outlined at Nginx - Updating OpenSSL 1.0.1K for Centmin Mod | Centmin Mod Community

    For Centmin Mod you need to do 2 updates:
    1. System OpenSSL update for CentOS
    2. Nginx recompile with OPENSSL_VER='1.0.2a' specified in centmin.sh
    Centmin Mod Nginx doesn't use system OpenSSL and is compiled statically - check command below will return blank/nothing for Centmin Mod Nginx. There's a reason why Centmin Mod Nginx is compiled against a statically linked OpenSSL version.

    Code:
     ldd `which nginx` | grep ssl
    will come back empty for Centmin Mod Nginx based servers.

    Note: for Nginx 1.7.9 updates you need to update your ngx_cache_purge version too - otherwise Nginx 1.7.9 installs will fail to compile properly. Details here.

    System OpenSSL update for CentOS



    Update: March 20th, more info on CVE-2015-0291 and other bugs from Redhat here

    Note: after system update you need to reboot your server to ensure all services which use OpenSSL also use the updated version.

    Usually Redhat and CentOS back port patches so you will see something like OpenSSL 1.0.1e-XX where XX is incremented version number with fixed patches. Will update this post once Redhat/CentOS have an updated YUM package.

    Also sometimes Redhat or CentOS system versions won't be affected by the OpenSSL source listed bugs/security issues. You have to read each CVE* listing on Red Hat and CentOS bug trackers to see if they apply or not.

    CentOS/Redhat system OpenSSL updates

    Heads up OpenSSL 1.0.1e-30.el6_6.7 update via YUM is available now if you didn't already use yum-cron for auto updates.

    Code:
    yum list updates -q | grep openssl
    openssl.x86_64                           1.0.1e-30.el6_6.7             updates
    openssl-devel.x86_64                     1.0.1e-30.el6_6.7             updates  
    Code:
    rpm -qa --changelog openssl | head -n11
    * Thu Mar 19 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-30.7
    - update fix for CVE-2015-0287 to what was released upstream
    
    * Wed Mar 18 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-30.6
    - fix CVE-2015-0209 - potential use after free in d2i_ECPrivateKey()
    - fix CVE-2015-0286 - improper handling of ASN.1 boolean comparison
    - fix CVE-2015-0287 - ASN.1 structure reuse decoding memory corruption
    - fix CVE-2015-0289 - NULL dereference decoding invalid PKCS#7 data
    - fix CVE-2015-0292 - integer underflow in base64 decoder
    - fix CVE-2015-0293 - triggerable assert in SSLv2 server
    To update
    Code:
    yum -y update
    Note: after system update you need to reboot your server to ensure all services which use OpenSSL also use the updated version.

    Nginx recompile with OPENSSL_VER='1.0.2a'



    Note: for Nginx 1.7.9 updates you need to update your ngx_cache_purge version too - otherwise Nginx 1.7.9 installs will fail to compile properly. Details here.

    To do this edit your centmin.sh file and

    change
    Code:
    OPENSSL_VER='1.0.2'
    
    to
    Code:
    OPENSSL_VER='1.0.2a'
    
    Then save centmin.sh. Then run centmin.sh

    or use sed to replace 1.0.2 to 1.0.2a
    Code:
    sed -i "s/OPENSSL_VERSION='1.0.2'/OPENSSL_VERSION='1.0.2a'/" centmin.sh
    check if OPENSSL_VERSION='1.0.2a'
    Code:
    grep ^OPENSSL centmin.sh
    OPENSSL_VERSION='1.0.2a'   # Use this version of OpenSSL
    Code:
    ./centmin.sh
    
    1. select menu option #4 to upgrade/downgrade Nginx
    2. when prompted select yes or no from YUM checks, select NO (really system OpenSSL update step above wouldn't be needed if you select yes to YUM checks here ;) )
    3. then when prompted specify Nginx version = 1.7.10
    4. For Centmin Mod .07 stable users when prompted for OpenSSL recompile select YES. Centmin Mod .08+ beta changed it to auto recompile only if OpenSSL version defined in centmin.sh differed from the Nginx running server's statically compiled OpenSSL version. For Centmin Mod .08 beta users they can manually work around this by editing inc/nginx_upgrade.inc line 107 and setting it to recompileopenssl='y' before running centmin.sh menu option 4
    5. let Nginx recompile run to completion, it should say Nginx installed successfully
    6. Check if Nginx compiled against 1.0.2a using Nginx -V command
    should see

     
    Last edited: Mar 27, 2015
  3. eva2000

    eva2000 Administrator Staff Member

    54,070
    12,176
    113
    May 24, 2014
    Brisbane, Australia
    Ratings:
    +18,734
    Local Time:
    2:45 AM
    Nginx 1.27.x
    MariaDB 10.x/11.4+
    of course above instructions won't work until after March 19th, when OpenSSL 1.0.2a is actually released :D
     
  4. dorobo

    dorobo Active Member

    420
    104
    43
    Jun 6, 2014
    Ratings:
    +162
    Local Time:
    12:45 AM
    latest
    latest
  5. eva2000

    eva2000 Administrator Staff Member

    54,070
    12,176
    113
    May 24, 2014
    Brisbane, Australia
    Ratings:
    +18,734
    Local Time:
    2:45 AM
    Nginx 1.27.x
    MariaDB 10.x/11.4+
    haha.. yeah hence why I added that post :D

    Best part of Centmin Mod Nginx and OpenSSL static compilation is end users can update to OpenSSL 1.0.2a as soon as source release is announced at OpenSSL: The Open Source toolkit for SSL/TLS without waiting on me to do anything :)
     
  6. rdan

    rdan Well-Known Member

    5,443
    1,402
    113
    May 25, 2014
    Ratings:
    +2,194
    Local Time:
    12:45 AM
    Mainline
    10.2
  7. Tythus

    Tythus Member

    61
    9
    8
    Aug 6, 2014
    Ratings:
    +12
    Local Time:
    4:45 PM
    oh thhankgod as I as just in
    [​IMG]
     
  8. deltahf

    deltahf Premium Member Premium Member

    585
    264
    63
    Jun 8, 2014
    Ratings:
    +486
    Local Time:
    11:45 AM
    As always, thanks very much for helping Centmindmod users stay on top of these announcements and security updates. I'm not sure how other sysadmins stay on top of this, guess you just have to know which mailing lists to subscribe to.
     
  9. eva2000

    eva2000 Administrator Staff Member

    54,070
    12,176
    113
    May 24, 2014
    Brisbane, Australia
    Ratings:
    +18,734
    Local Time:
    2:45 AM
    Nginx 1.27.x
    MariaDB 10.x/11.4+
    yeah - pretty much have Centmin Mod LEMP installed on 35+ of my own servers (lot VPS) including this forum's Linode 4GB VPS server, so it's also in my best interest to keep Centmin Mod secure as possible :D
     
  10. Steve Tozer

    Steve Tozer Member

    70
    42
    18
    Jul 28, 2014
    South Wales, UK
    Ratings:
    +49
    Local Time:
    4:45 PM
    1.91
    10.0.19
    I find myself checking twitter feeds and other forums and of course here daily to keep up to date on whats going on in the server world :geek:
     
  11. eva2000

    eva2000 Administrator Staff Member

    54,070
    12,176
    113
    May 24, 2014
    Brisbane, Australia
    Ratings:
    +18,734
    Local Time:
    2:45 AM
    Nginx 1.27.x
    MariaDB 10.x/11.4+
  12. eva2000

    eva2000 Administrator Staff Member

    54,070
    12,176
    113
    May 24, 2014
    Brisbane, Australia
    Ratings:
    +18,734
    Local Time:
    2:45 AM
    Nginx 1.27.x
    MariaDB 10.x/11.4+
    OpenSSL's head honchos Matt Caswell stated yesterday (March 18th):
    so ~6-10hrs from now :)
     
  13. eva2000

    eva2000 Administrator Staff Member

    54,070
    12,176
    113
    May 24, 2014
    Brisbane, Australia
    Ratings:
    +18,734
    Local Time:
    2:45 AM
    Nginx 1.27.x
    MariaDB 10.x/11.4+
  14. Steve Tozer

    Steve Tozer Member

    70
    42
    18
    Jul 28, 2014
    South Wales, UK
    Ratings:
    +49
    Local Time:
    4:45 PM
    1.91
    10.0.19
    The fun begins! :eek:
     
  15. eva2000

    eva2000 Administrator Staff Member

    54,070
    12,176
    113
    May 24, 2014
    Brisbane, Australia
    Ratings:
    +18,734
    Local Time:
    2:45 AM
    Nginx 1.27.x
    MariaDB 10.x/11.4+
    http://openssl.org/news/secadv_20150319.txt

    Code:
    OpenSSL Security Advisory [19 Mar 2015]
    =======================================
    
    OpenSSL 1.0.2 ClientHello sigalgs DoS (CVE-2015-0291)
    =====================================================
    
    Severity: High
    
    If a client connects to an OpenSSL 1.0.2 server and renegotiates with an
    invalid signature algorithms extension a NULL pointer dereference will occur.
    This can be exploited in a DoS attack against the server.
    
    This issue affects OpenSSL version: 1.0.2
    
    OpenSSL 1.0.2 users should upgrade to 1.0.2a.
    
    This issue was was reported to OpenSSL on 26th February 2015 by David Ramos
    of Stanford University. The fix was developed by Stephen Henson and Matt
    Caswell of the OpenSSL development team.
    
    Reclassified: RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204)
    ============================================================================
    
    Severity: High
    
    This security issue was previously announced by the OpenSSL project and
    classified as "low" severity. This severity rating has now been changed to
    "high".
    
    This was classified low because it was originally thought that server RSA
    export ciphersuite support was rare: a client was only vulnerable to a MITM
    attack against a server which supports an RSA export ciphersuite. Recent
    studies have shown that RSA export ciphersuites support is far more common.
    
    This issue affects OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.
    
    OpenSSL 1.0.1 users should upgrade to 1.0.1k.
    OpenSSL 1.0.0 users should upgrade to 1.0.0p.
    OpenSSL 0.9.8 users should upgrade to 0.9.8zd.
    
    This issue was reported to OpenSSL on 22nd October 2014 by Karthikeyan
    Bhargavan of the PROSECCO team at INRIA. The fix was developed by Stephen
    Henson of the OpenSSL core team. It was previously announced in the OpenSSL
    security advisory on 8th January 2015.
    
    Multiblock corrupted pointer (CVE-2015-0290)
    ============================================
    
    Severity: Moderate
    
    OpenSSL 1.0.2 introduced the "multiblock" performance improvement. This feature
    only applies on 64 bit x86 architecture platforms that support AES NI
    instructions. A defect in the implementation of "multiblock" can cause OpenSSL's
    internal write buffer to become incorrectly set to NULL when using non-blocking
    IO. Typically, when the user application is using a socket BIO for writing, this
    will only result in a failed connection. However if some other BIO is used then
    it is likely that a segmentation fault will be triggered, thus enabling a
    potential DoS attack.
    
    This issue affects OpenSSL version: 1.0.2
    
    OpenSSL 1.0.2 users should upgrade to 1.0.2a.
    
    This issue was reported to OpenSSL on 13th February 2015 by Daniel Danner and
    Rainer Mueller. The fix was developed by Matt Caswell of the OpenSSL development
    team.
    
    Segmentation fault in DTLSv1_listen (CVE-2015-0207)
    ===================================================
    
    Severity: Moderate
    
    The DTLSv1_listen function is intended to be stateless and processes the initial
    ClientHello from many peers. It is common for user code to loop over the call to
    DTLSv1_listen until a valid ClientHello is received with an associated cookie. A
    defect in the implementation of DTLSv1_listen means that state is preserved in
    the SSL object from one invocation to the next that can lead to a segmentation
    fault. Errors processing the initial ClientHello can trigger this scenario. An
    example of such an error could be that a DTLS1.0 only client is attempting to
    connect to a DTLS1.2 only server.
    
    This issue affects OpenSSL version: 1.0.2
    
    OpenSSL 1.0.2 DTLS users should upgrade to 1.0.2a.
    
    This issue was reported to OpenSSL on 27th January 2015 by Per Allansson. The
    fix was developed by Matt Caswell of the OpenSSL development team.
    
    Segmentation fault in ASN1_TYPE_cmp (CVE-2015-0286)
    ===================================================
    
    Severity: Moderate
    
    The function ASN1_TYPE_cmp will crash with an invalid read if an attempt is
    made to compare ASN.1 boolean types. Since ASN1_TYPE_cmp is used to check
    certificate signature algorithm consistency this can be used to crash any
    certificate verification operation and exploited in a DoS attack. Any
    application which performs certificate verification is vulnerable including
    OpenSSL clients and servers which enable client authentication.
    
    This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0 and 0.9.8.
    
    OpenSSL 1.0.2 users should upgrade to 1.0.2a
    OpenSSL 1.0.1 users should upgrade to 1.0.1m.
    OpenSSL 1.0.0 users should upgrade to 1.0.0r.
    OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
    
    This issue was discovered and fixed by Stephen Henson of the OpenSSL
    development team.
    
    Segmentation fault for invalid PSS parameters (CVE-2015-0208)
    =============================================================
    
    Severity: Moderate
    
    The signature verification routines will crash with a NULL pointer
    dereference if presented with an ASN.1 signature using the RSA PSS
    algorithm and invalid parameters. Since these routines are used to verify
    certificate signature algorithms this can be used to crash any
    certificate verification operation and exploited in a DoS attack. Any
    application which performs certificate verification is vulnerable including
    OpenSSL clients and servers which enable client authentication.
    
    This issue affects OpenSSL version: 1.0.2
    
    OpenSSL 1.0.2 users should upgrade to 1.0.2a
    
    This issue was was reported to OpenSSL on 31st January 2015 by Brian Carpenter
    and a fix developed by Stephen Henson of the OpenSSL development team.
    
    ASN.1 structure reuse memory corruption (CVE-2015-0287)
    =======================================================
    
    Severity: Moderate
    
    Reusing a structure in ASN.1 parsing may allow an attacker to cause
    memory corruption via an invalid write. Such reuse is and has been
    strongly discouraged and is believed to be rare.
    
    Applications that parse structures containing CHOICE or ANY DEFINED BY
    components may be affected. Certificate parsing (d2i_X509 and related
    functions) are however not affected. OpenSSL clients and servers are
    not affected.
    
    This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
    and 0.9.8.
    
    OpenSSL 1.0.2 users should upgrade to 1.0.2a
    OpenSSL 1.0.1 users should upgrade to 1.0.1m.
    OpenSSL 1.0.0 users should upgrade to 1.0.0r.
    OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
    
    This issue was discovered by Emilia Käsper and a fix developed by
    Stephen Henson of the OpenSSL development team.
    
    PKCS7 NULL pointer dereferences (CVE-2015-0289)
    ===============================================
    
    Severity: Moderate
    
    The PKCS#7 parsing code does not handle missing outer ContentInfo correctly.
    An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with
    missing content and trigger a NULL pointer dereference on parsing.
    
    Applications that verify PKCS#7 signatures, decrypt PKCS#7 data or
    otherwise parse PKCS#7 structures from untrusted sources are
    affected. OpenSSL clients and servers are not affected.
    
    This issue affects all current OpenSSL versions: 1.0.2, 1.0.1, 1.0.0
    and 0.9.8.
    
    OpenSSL 1.0.2 users should upgrade to 1.0.2a
    OpenSSL 1.0.1 users should upgrade to 1.0.1m.
    OpenSSL 1.0.0 users should upgrade to 1.0.0r.
    OpenSSL 0.9.8 users should upgrade to 0.9.8zf.
    
    This issue was reported to OpenSSL on February 16th 2015 by Michal
    Zalewski (Google) and a fix developed by Emilia Käsper of the OpenSSL
    development team.
    
     
  16. eva2000

    eva2000 Administrator Staff Member

    54,070
    12,176
    113
    May 24, 2014
    Brisbane, Australia
    Ratings:
    +18,734
    Local Time:
    2:45 AM
    Nginx 1.27.x
    MariaDB 10.x/11.4+
    updated forums first

    had to switch off chacha20_poly1305 cipher patch to use 1.0.2a official for now

     
  17. eva2000

    eva2000 Administrator Staff Member

    54,070
    12,176
    113
    May 24, 2014
    Brisbane, Australia
    Ratings:
    +18,734
    Local Time:
    2:45 AM
    Nginx 1.27.x
    MariaDB 10.x/11.4+
    Interesting while updating other servers with Centmin Mod LEMP with recompile for Nginx 1.7.10 + openssl 1.0.2a noticing that sometimes github related downloads fail. It must be github.com updating their own SSL/https servers right now causing temporarily download failures ? If you experience such, just wait a bit and re-try centmin.sh menu option 4 to upgrade/recompile Nginx 1.7.10 with updated openssl 1.0.2a as per 2nd post of this thread
     
  18. rdan

    rdan Well-Known Member

    5,443
    1,402
    113
    May 25, 2014
    Ratings:
    +2,194
    Local Time:
    12:45 AM
    Mainline
    10.2
    Code:
    # nginx -V
    nginx version: nginx/1.7.10
    built by gcc 4.4.7 20120313 (Red Hat 4.4.7-11) (GCC)
    TLS SNI support enabled
    configure arguments: --sbin-path=/usr/local/sbin/nginx --conf-path=/usr/local/nginx/conf/nginx.conf --with-http_ssl_module --with-http_gzip_static_module --with-http_stub_status_module --with-http_sub_module --with-http_addition_module --with-http_image_filter_module --with-http_secure_link_module --with-http_flv_module --with-http_realip_module --with-openssl-opt=enable-tlsext --add-module=../ngx-fancyindex-ngx-fancyindex --add-module=../ngx_cache_purge-2.3 --add-module=../headers-more-nginx-module-0.25 --add-module=../nginx-accesskey-2.0.3 --add-module=../nginx-http-concat-master --with-openssl=../openssl-1.0.2a --with-libatomic --with-pcre=../pcre-8.36 --with-pcre-jit --with-http_spdy_module
    
     
  19. rdan

    rdan Well-Known Member

    5,443
    1,402
    113
    May 25, 2014
    Ratings:
    +2,194
    Local Time:
    12:45 AM
    Mainline
    10.2
    What specific URL download fails?
    ngx_pagespeed?
    I think I didn't encounter this problem.
     
  20. eva2000

    eva2000 Administrator Staff Member

    54,070
    12,176
    113
    May 24, 2014
    Brisbane, Australia
    Ratings:
    +18,734
    Local Time:
    2:45 AM
    Nginx 1.27.x
    MariaDB 10.x/11.4+
    well ngx_pagespeed is on both google and github but sometimes the nginx module downloads as most are on github too

    it's times like these why I am thinking of local mirror download repository for Centmin Mod downloads for Centmin Mod Premium members :)