mirror of
				https://github.com/xcat2/xcat-core.git
				synced 2025-10-30 19:02:27 +00:00 
			
		
		
		
	Merge pull request #1064 from whowutwut/security_notices
Move the security advisories over to RTD from GitHub Wiki
This commit is contained in:
		| @@ -35,4 +35,5 @@ Table of Contents | ||||
|    troubleshooting/index.rst | ||||
|    developers/index.rst | ||||
|    help.rst | ||||
|    security/index.rst | ||||
|  | ||||
|   | ||||
							
								
								
									
										28
									
								
								docs/source/security/2016/20160115_openssl.rst
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										28
									
								
								docs/source/security/2016/20160115_openssl.rst
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,28 @@ | ||||
| 2016-01-15 - OpenSSL Vulnerabilities (SLOTH) | ||||
| ============================================ | ||||
|  | ||||
| A detailed description of this issue can be seen in the following blog posting: http://www.mitls.org/pages/attacks/SLOTH | ||||
|  | ||||
| Advisory CVEs | ||||
| ------------- | ||||
|  | ||||
| `CVE-2015-7575 <https://access.redhat.com/security/cve/CVE-2015-7575>`_ - TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) | ||||
|  | ||||
| Action | ||||
| ------ | ||||
|  | ||||
| xCAT uses OpenSSL for client-server communication but **does not** ship it.   | ||||
|  | ||||
| It is highly recommended to keep your OpenSSL levels up-to-date with the indicated versions in the security bulletins to prevent any potential security threats. Obtain the updated software packages from your Operating system distribution channels.  | ||||
|  | ||||
|  | ||||
|  | ||||
| Disable MD5 authentication in the cipher list using the site table keyword ``xcatsslciphers``. | ||||
|  | ||||
| 1. Check if MD5 is already disabled: ``tabdump site | grep xcatssl`` | ||||
|  | ||||
| 2. If nothing is set, add ``ALL:!MD5`` to the cipher list:  ``chtab key=xcatsslciphers site.value='ALL:!MD5'`` | ||||
|  | ||||
| 3. Restart xcat:  ``service xcatd restart`` | ||||
|  | ||||
|  | ||||
							
								
								
									
										28
									
								
								docs/source/security/2016/20160128_openssl.rst
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										28
									
								
								docs/source/security/2016/20160128_openssl.rst
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,28 @@ | ||||
| 2016-01-28 - OpenSSL Vulnerabilities | ||||
| ==================================== | ||||
|  | ||||
| *Jan 28, 2016* OpenSSL announced the following security advisories:  https://mta.openssl.org/pipermail/openssl-announce/2016-January/000061.html | ||||
|  | ||||
| Advisory CVEs | ||||
| ------------- | ||||
|  | ||||
| * CVE-2016-0701 - **DH small subgroups**  (Severity:High) | ||||
|  | ||||
|   This issue affects OpenSSL version 1.0.2.   | ||||
|   OpenSSL 1.0.2 users should upgrade to 1.0.2f | ||||
|  | ||||
| * CVE-2015-3197 - **SSLv2 doesn't block disabled ciphers**   (Severity:Low) | ||||
|  | ||||
|   This issue affects OpenSSL versions 1.0.2 and 1.0.1.   | ||||
|  | ||||
|   OpenSSL 1.0.2 users should upgrade to 1.0.2f   | ||||
|   OpenSSL 1.0.1 users should upgrade to 1.0.1r | ||||
|  | ||||
|  | ||||
| Action | ||||
| ------ | ||||
|  | ||||
| xCAT uses OpenSSL for client-server communication but **does not** ship it. | ||||
|  | ||||
| It is recommended to keep your OpenSSL levels up-to-date with the indicated versions in the security bulletins to prevent any potential security threats.  | ||||
|  | ||||
							
								
								
									
										68
									
								
								docs/source/security/2016/20160301_openssl.rst
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										68
									
								
								docs/source/security/2016/20160301_openssl.rst
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,68 @@ | ||||
| 2016-03-01 - OpenSSL Vulnerabilities (DROWN) | ||||
| ============================================ | ||||
|  | ||||
| *March 1, 2016* OpenSSL announced the following security advisories:  https://www.openssl.org/news/secadv/20160301.txt | ||||
|  | ||||
| Advisory CVEs | ||||
| ------------- | ||||
|  | ||||
| * CVE-2016-0800 - **Cross-protocol attack on TLS using SSLv2 (DROWN)**  (Severity:High) | ||||
|  | ||||
|   This issue affects OpenSSL versions 1.0.1 and 1.0.2.   | ||||
|    | ||||
|   OpenSSL 1.0.2 users should upgrade to 1.0.2g   | ||||
|   OpenSSL 1.0.1 users should upgrade to 1.0.1s | ||||
|  | ||||
| * CVE-2016-0705 - **Double-free in DSA code** (Severity:Low) | ||||
|  | ||||
|   This issue affects OpenSSL versions 1.0.2 and 1.0.1. | ||||
|  | ||||
|   OpenSSL 1.0.2 users should upgrade to 1.0.2g   | ||||
|   OpenSSL 1.0.1 users should upgrade to 1.0.1s | ||||
|  | ||||
| * CVE-2016-0798  - **Memory leak in SRP database lookups** (Severity:Low) | ||||
|   | ||||
|   This issue affects OpenSSL versions 1.0.2 and 1.0.1. | ||||
|  | ||||
|   OpenSSL 1.0.2 users should upgrade to 1.0.2g   | ||||
|   OpenSSL 1.0.1 users should upgrade to 1.0.1s | ||||
|  | ||||
| * CVE-2016-0797  - **BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption** (Severity:Low) | ||||
|   | ||||
|   This issue affects OpenSSL versions 1.0.2 and 1.0.1. | ||||
|  | ||||
|   OpenSSL 1.0.2 users should upgrade to 1.0.2g   | ||||
|   OpenSSL 1.0.1 users should upgrade to 1.0.1s | ||||
|  | ||||
|  | ||||
| * CVE-2016-0797  - **Fix memory issues in BIO_*printf functions** (Severity:Low) | ||||
|   | ||||
|   This issue affects OpenSSL versions 1.0.2 and 1.0.1. | ||||
|  | ||||
|   OpenSSL 1.0.2 users should upgrade to 1.0.2g   | ||||
|   OpenSSL 1.0.1 users should upgrade to 1.0.1s | ||||
|  | ||||
|  | ||||
| * CVE-2016-0702  - **Side channel attack on modular exponentiation** (Severity:Low) | ||||
|   | ||||
|   This issue affects OpenSSL versions 1.0.2 and 1.0.1. | ||||
|  | ||||
|   OpenSSL 1.0.2 users should upgrade to 1.0.2g   | ||||
|   OpenSSL 1.0.1 users should upgrade to 1.0.1s | ||||
|  | ||||
| * CVE-2016-0703  - **Divide-and-conquer session key recovery in SSLv2** (Severity:High) | ||||
|   | ||||
|   This issue affected OpenSSL versions 1.0.2, 1.0.1l, 1.0.0q, 0.9.8ze and all earlier versions.  It was fixed in OpenSSL 1.0.2a, 1.0.1m, 1.0.0r and 0.9.8zf | ||||
|  | ||||
| * CVE-2016-0704  - **Bleichenbacher oracle in SSLv2** (Severity:Moderate) | ||||
|   | ||||
|   This issue affected OpenSSL versions 1.0.2, 1.0.1l, 1.0.0q, 0.9.8ze and all earlier versions.  It was fixed in OpenSSL 1.0.2a, 1.0.1m, 1.0.0r and 0.9.8zf | ||||
|  | ||||
|  | ||||
| Action | ||||
| ------ | ||||
|  | ||||
| xCAT uses OpenSSL for client-server communication but **does not** ship it.  Regarding CVE-2016-0800, xCAT also does not use SSLv2 layer but uses the newer TLS transport layer security.   | ||||
|  | ||||
| It is recommended to keep your OpenSSL levels up-to-date with the indicated versions in the security bulletins to prevent any potential security threats.  | ||||
|  | ||||
							
								
								
									
										52
									
								
								docs/source/security/2016/20160503_openssl.rst
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										52
									
								
								docs/source/security/2016/20160503_openssl.rst
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,52 @@ | ||||
| 2016-05-03 - OpenSSL Vulnerabilities (ANS.1 encoder) | ||||
| ==================================================== | ||||
|  | ||||
| *May 3, 2016* OpenSSL announced the following security advisories:  https://www.openssl.org/news/secadv/20160503.txt | ||||
|  | ||||
| Advisory CVEs | ||||
| ------------- | ||||
|  | ||||
| * CVE-2016-2108 - **Memory corruption in the ASN.1 encoder** (Severity:High) | ||||
|  | ||||
|   This issue affects all OpenSSL version prior to April 2015 | ||||
|    | ||||
|   OpenSSL 1.0.2 users should upgrade to 1.0.2c | ||||
|   OpenSSL 1.0.1 users should upgrade to 1.0.1o | ||||
|  | ||||
| * CVE-2016-2107 - **Padding oracle in AES-NI CBC MAC check** (Severity: High) | ||||
|  | ||||
|   This issue was introduced as part of the fix for Lucky 13 padding attack (CVE-2013-0169) | ||||
|  | ||||
|   OpenSSL 1.0.2 users should upgrade to 1.0.2h | ||||
|   OpenSSL 1.0.1 users should upgrade to 1.0.1t | ||||
|  | ||||
| * CVE-2016-2105 - **EVP_EncodeUpdate overflow** (Severity:Low) | ||||
|   | ||||
|   OpenSSL 1.0.2 users should upgrade to 1.0.2h | ||||
|   OpenSSL 1.0.1 users should upgrade to 1.0.1t | ||||
|  | ||||
| * CVE-2016-2106 - **EVP_EncryptUpdate overflow** (Severity:Low) | ||||
|   | ||||
|   OpenSSL 1.0.2 users should upgrade to 1.0.2h | ||||
|   OpenSSL 1.0.1 users should upgrade to 1.0.1t | ||||
|  | ||||
|  | ||||
| * CVE-2016-2109 - **ASN.1 BIO excessive memory allocation** (Severity:Low) | ||||
|  | ||||
|   OpenSSL 1.0.2 users should upgrade to 1.0.2h | ||||
|   OpenSSL 1.0.1 users should upgrade to 1.0.1t | ||||
|  | ||||
|  | ||||
| * CVE-2016-2176 - **EBCDIC overread** (Severity:Low) | ||||
|   | ||||
|   OpenSSL 1.0.2 users should upgrade to 1.0.2h | ||||
|   OpenSSL 1.0.1 users should upgrade to 1.0.1t | ||||
|  | ||||
|  | ||||
| Action | ||||
| ------ | ||||
|  | ||||
| xCAT uses OpenSSL for client-server communication but **does not** ship it.   | ||||
|  | ||||
| It is recommended to keep your OpenSSL levels up-to-date with the indicated versions in the security bulletins to prevent any potential security threats.  | ||||
|  | ||||
							
								
								
									
										10
									
								
								docs/source/security/2016/index.rst
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										10
									
								
								docs/source/security/2016/index.rst
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,10 @@ | ||||
| 2016 Notices  | ||||
| ============ | ||||
|  | ||||
| .. toctree:: | ||||
|    :maxdepth: 1 | ||||
|  | ||||
|    20160503_openssl.rst | ||||
|    20160301_openssl.rst | ||||
|    20160128_openssl.rst | ||||
|    20160115_openssl.rst | ||||
							
								
								
									
										8
									
								
								docs/source/security/index.rst
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										8
									
								
								docs/source/security/index.rst
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,8 @@ | ||||
| Security Notices | ||||
| ================ | ||||
|  | ||||
| .. toctree:: | ||||
|    :maxdepth: 2 | ||||
|  | ||||
|    2016/index.rst | ||||
|    2015/index.rst | ||||
		Reference in New Issue
	
	Block a user