Unsure which patch(es) to apply for DROWN

Latest response

I'm a RHEL newbie.
We have some RHEL 6.7 servers.

I ran the DROWN-test.sh script and received the following result:

WARNING: The installed version of openssl (openssl-1.0.1e-42.el6.x86_64) is vulnerable to the general DROWN attack and should be upgraded.

See https://access.redhat.com/security/vulnerabilities/drown for more information.

Which DROWN patch or patches do I run to fix the vulnerability?
I'm unclear on which one I should use.
Thanks in advance.

Responses

We have 4 different RHEL 6.7 servers that all gave us the vulnerable warning. We just did "yum list openssl", and it told us that we were at openssl.x86_64 version 1.0.1e-42.el6_7.2, and that version 1.0.1e-42.el6_7.4 was available, so we just did a yum install on openssl.x86_64 and it upgraded us to version 1.0.1e-42.el6_7.4. After that we re-ran the DROWN-test.sh and it told us we were no longer vulnerable. Same solution worked on all our servers.

Thanks for replying Julie. I tried "yum list openssl" on my 1 RHEL box that's internet connected. I received an error. So I ran "yum update" first and when the update was complete I ran "yum list openssl" again. This time the command ran without error and showed that I had 1.0.1e-42.el6_7.4 installed. The DROWN script now runs without giving a warning. Thanks again.

See Red Hat's response/mitigation to CVE-2016-0800 with the Errata rpm links for any given version. And if you are not connected to either Red Hat directly, or do not have a satellite server but DO have a subscription, you can find the specific RPM you've identified from the previous link through Red Hat RPM search

(for others besides Mark Smith)--> At this link https://access.redhat.com/labs/drown/ is the Red Hat vulnerability checker which is this shell script https://access.redhat.com/labs/drown/DROWN-test.sh and the signature of that script is at this link: https://access.redhat.com/labs/drown/DROWN-test.sh.asc.

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.