mirror of
				https://github.com/xcat2/xcat-core.git
				synced 2025-10-31 11:22:27 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			29 lines
		
	
	
		
			1.0 KiB
		
	
	
	
		
			ReStructuredText
		
	
	
	
	
	
			
		
		
	
	
			29 lines
		
	
	
		
			1.0 KiB
		
	
	
	
		
			ReStructuredText
		
	
	
	
	
	
| 2016-01-15 - OpenSSL Vulnerabilities (SLOTH)
 | |
| ============================================
 | |
| 
 | |
| A detailed description of this issue can be seen in the following blog posting: http://www.mitls.org/pages/attacks/SLOTH
 | |
| 
 | |
| Advisory CVEs
 | |
| -------------
 | |
| 
 | |
| `CVE-2015-7575 <https://access.redhat.com/security/cve/CVE-2015-7575>`_ - TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH)
 | |
| 
 | |
| Action
 | |
| ------
 | |
| 
 | |
| xCAT uses OpenSSL for client-server communication but **does not** ship it.
 | |
| 
 | |
| It is highly recommended to keep your OpenSSL levels up-to-date with the indicated versions in the security bulletins to prevent any potential security threats. Obtain the updated software packages from your Operating system distribution channels.
 | |
| 
 | |
| 
 | |
| 
 | |
| Disable MD5 authentication in the cipher list using the site table keyword ``xcatsslciphers``.
 | |
| 
 | |
| 1. Check if MD5 is already disabled: ``tabdump site | grep xcatssl``
 | |
| 
 | |
| 2. If nothing is set, add ``ALL:!MD5`` to the cipher list:  ``chtab key=xcatsslciphers site.value='ALL:!MD5'``
 | |
| 
 | |
| 3. Restart xcat:  ``service xcatd restart``
 | |
| 
 | |
| 
 |