- Issued:
- 2014-04-08
- Updated:
- 2014-04-08
RHSA-2014:0377 - Security Advisory
Synopsis
Important: openssl security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated openssl packages that fix one security issue are now available for
Red Hat Storage 2.1.
The Red Hat Security Response Team has rated this update as having
Important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Description
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols, as well as a
full-strength, general purpose cryptography library.
An information disclosure flaw was found in the way OpenSSL handled TLS and
DTLS Heartbeat Extension packets. A malicious TLS or DTLS client or server
could send a specially crafted TLS or DTLS Heartbeat packet to disclose a
limited portion of memory per request from a connected client or server.
Note that the disclosed portions of memory could potentially include
sensitive information such as private keys. (CVE-2014-0160)
Red Hat would like to thank the OpenSSL project for reporting this issue.
Upstream acknowledges Neel Mehta of Google Security as the original
reporter.
All users of Red Hat Storage are advised to upgrade to these updated
packages, which contain a backported patch to correct this issue. For the
update to take effect, all services linked to the OpenSSL library (such as
httpd and other SSL-enabled services) must be restarted or the system
rebooted.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Gluster Storage Server for On-premise 2.1 x86_64
- Red Hat Storage for Public Cloud (via RHUI) 2.1 x86_64
Fixes
- BZ - 1084875 - CVE-2014-0160 openssl: information disclosure in handling of TLS heartbeat extension packets
CVEs
Red Hat Gluster Storage Server for On-premise 2.1
SRPM | |
---|---|
openssl-1.0.1e-16.el6_5.7.src.rpm | SHA-256: dd7f3bddba0a4d4084ec98ed71d50314c8644346924676dc9b10cd2de2bc90d1 |
x86_64 | |
openssl-1.0.1e-16.el6_5.7.x86_64.rpm | SHA-256: 10d813e9fcc55f47655791e269b40fecd45b8396230b1c03a0ed77d859a4b0d2 |
openssl-debuginfo-1.0.1e-16.el6_5.7.x86_64.rpm | SHA-256: 1d3702a766e4c3b150eb7aa04772e61302e985ddc0d23d05c83b32347891637a |
openssl-devel-1.0.1e-16.el6_5.7.x86_64.rpm | SHA-256: 6f0e88747e196160a552998c94c13f0be0acd14122d0a8b992833e068b12e9ee |
openssl-perl-1.0.1e-16.el6_5.7.x86_64.rpm | SHA-256: da22dff3394579ab544d772d37a3b57b89ee334d96c641409793560b5f17cafc |
openssl-static-1.0.1e-16.el6_5.7.x86_64.rpm | SHA-256: 82412749e48786c0f272ed83b391f6cf56410268e365ace556fedfcb0d04f8e1 |
Red Hat Storage for Public Cloud (via RHUI) 2.1
SRPM | |
---|---|
openssl-1.0.1e-16.el6_5.7.src.rpm | SHA-256: dd7f3bddba0a4d4084ec98ed71d50314c8644346924676dc9b10cd2de2bc90d1 |
x86_64 | |
openssl-1.0.1e-16.el6_5.7.x86_64.rpm | SHA-256: 10d813e9fcc55f47655791e269b40fecd45b8396230b1c03a0ed77d859a4b0d2 |
openssl-debuginfo-1.0.1e-16.el6_5.7.x86_64.rpm | SHA-256: 1d3702a766e4c3b150eb7aa04772e61302e985ddc0d23d05c83b32347891637a |
openssl-devel-1.0.1e-16.el6_5.7.x86_64.rpm | SHA-256: 6f0e88747e196160a552998c94c13f0be0acd14122d0a8b992833e068b12e9ee |
openssl-perl-1.0.1e-16.el6_5.7.x86_64.rpm | SHA-256: da22dff3394579ab544d772d37a3b57b89ee334d96c641409793560b5f17cafc |
openssl-static-1.0.1e-16.el6_5.7.x86_64.rpm | SHA-256: 82412749e48786c0f272ed83b391f6cf56410268e365ace556fedfcb0d04f8e1 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.