2
0
mirror of https://github.com/xcat2/xcat-core.git synced 2025-05-22 03:32:04 +00:00
xcat-core/docs/source/security/2015/20151203_openssl.rst
Victor Hu b90fe27096 Created the security notices that were on SF for 2015 into the xCAT
documentation so we can clean up the GitHub Wiki to remove security
notices from that location. I think saving the last 2 years is sufficient
and probably should get removed over time.
2016-08-18 09:29:42 -04:00

43 lines
1.4 KiB
ReStructuredText

2015-12-03 - OpenSSL Vulnerabilities
====================================
OpenSSL announced security fixes on 12/03/15 in the following bulletin: http://openssl.org/news/secadv/20151203.txt
Advisory CVEs
-------------
* CVE-2015-3193 - **BN_mod_exp may produce incorrect results on x86_64** (Severity:Moderate)
OpenSSL 1.0.2 users should upgrade to 1.0.2e
* CVE-2015-3194 - **Certificate verify crash with missing PSS parameter** (Severity:Moderate)
OpenSSL 1.0.2 users should upgrade to 1.0.2e
OpenSSL 1.0.1 users should upgrade to 1.0.1q
* CVE-2015-3195 - **X509_ATTRIBUTE memory leak** (Severity:Moderate)
OpenSSL 1.0.2 users should upgrade to 1.0.2e
OpenSSL 1.0.1 users should upgrade to 1.0.1q
OpenSSL 1.0.0 users should upgrade to 1.0.0t
OpenSSL 0.9.8 users should upgrade to 0.9.8zh
* CVE-2015-3196 - **Race condition handling PSK identify hint** (Severity:Low)
OpenSSL 1.0.2 users should upgrade to 1.0.2d
OpenSSL 1.0.1 users should upgrade to 1.0.1p
OpenSSL 1.0.0 users should upgrade to 1.0.0t
* CVE-2015-1794 - **Anon DH ServerKeyExchange with 0 p parameter** (Severity:Low)
OpenSSL 1.0.2 users should upgrade to 1.0.2e
Action
------
xCAT uses OpenSSL for client-server communication but **does not** ship it.
It is recommended to keep your OpenSSL levels up-to-date with the indicated versions in the security bulletins to prevent any potential security threats.