OpenSSL CVE-2014-0160 Heartbleed bug and Red Hat Storage (RHS)
Environment
- Red Hat Storage 2.1.2 is affected
- Specifically openssl versions from
openssl-1.0.1e-15.el6
throughopenssl-1.0.1e-16.el6_5.4
- Specifically openssl versions from
- Red Hat Storage 2.0 is NOT affected
- Refer to https://access.redhat.com/site/announcements/781953 for other affected products
Issue
- Does CVE-2014-0160 affect Red Hat Storage?
- Need fix for openssl heartbleed bug
Resolution
-
Red Hat is not aware of any public exploit being used in the wild for this issue prior to the date of disclosure. However, a number of public exploits were published shortly after the issue was disclosed. These exploits could lead to the disclosure of information handled by applications using OpenSSL, including private keys, session tokens, and data submitted by users, which could include authentication credentials. It is recommended that you assess the risk this could pose to your systems, and perform additional remediation as you deem appropriate. (For more details on additional remediation steps, refer to: How to recover from the Heartbleed OpenSSL vulnerability.)
-
All users are strongly advised to upgrade to openssl-1.0.1e-16.el6_5.7 (RHSA-2014:0377) or later, which corrects this issue
-
As always, registered Red Hat Storage systems with internet access (or systems connected to Satellites, etc) can be updated via yum
yum update openssl
-
After successfully updating the openssl package, any resident processes (e.g., services) linked to OpenSSL library (httpd, sshd) must be restarted to close the vulnerability (alternative: reboot)
-
Reference the Red Hat Storage Installation Guide chapter on updating for additional general comments about updating RHS
-
Note that there is no current ISO method of deployment for this issue; the openssl package(s) must be updated
If a system is in a disconnected environment, the package(s) can be copied to the system and installed manually
-
Root Cause
-
Official statement from Security Advisory RHSA-2014:0377:
An information disclosure flaw was found in the way OpenSSL handled TLS and
DTLS Heartbeat Extension packets. A malicious TLS or DTLS client or server
could send a specially crafted TLS or DTLS Heartbeat packet to disclose a
limited portion of memory per request from a connected client or server.
Note that the disclosed portions of memory could potentially include
sensitive information such as private keys. (CVE-2014-0160) -
For any ongoing developments, monitor the entry for CVE-2014-0160 in Red Hat's CVE Database
Diagnostic Steps
-
Red Hat has provided a tool to help automatically check public sites vulnerability to this vulnerability. This tool is for informational purposes only, but can help you quickly check systems before and after applying the updated packages.
-
Affected systems are those running Red Hat Storage 2.1.2, but more specifically, a version of the openssl package from
openssl-1.0.1e-15.el6
throughopenssl-1.0.1e-16.el6_5.4
-
To check the current openssl package version:
# rpm -q openssl openssl-1.0.1e-16.el6_5.4.x86_64
This solution is part of Red Hat’s fast-track publication program, providing a huge library of solutions that Red Hat engineers have created while supporting our customers. To give you the knowledge you need the instant it becomes available, these articles may be presented in a raw and unedited form.
Comments