The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of OpenSSL: information disclosure via RSA Constant Time Key Generation

Synthesis of the vulnerability 

An attacker can bypass access restrictions to data via RSA Constant Time Key Generation of OpenSSL, in order to obtain sensitive information.
Vulnerable products: Debian, VNX Operating Environment, VNX Series, Fedora, AIX, BladeCenter, IBM i, Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series, Juniper SBR, MariaDB ~ precise, MySQL Community, MySQL Enterprise, Nodejs Core, OpenBSD, OpenSSL, openSUSE Leap, Oracle Communications, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Solaris, Tuxedo, Oracle Virtual Directory, VirtualBox, WebLogic, Palo Alto Firewall PA***, PAN-OS, Percona Server, XtraBackup, Pulse Connect Secure, Pulse Secure Client, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Nessus, Ubuntu, X2GoClient.
Severity of this weakness: 1/4.
Creation date: 17/04/2018.
Références of this bulletin: bulletinjul2018, CERTFR-2018-AVI-511, CERTFR-2018-AVI-607, cpuapr2019, cpuapr2020, cpujan2019, cpujul2019, cpuoct2018, CVE-2018-0737, DLA-1449-1, DSA-2020-030, DSA-4348-1, DSA-4355-1, FEDORA-2019-00c25b9379, ibm10729805, ibm10743283, ibm10880781, JSA10919, JSA10990, openSUSE-SU-2018:2695-1, openSUSE-SU-2018:2957-1, openSUSE-SU-2018:3015-1, openSUSE-SU-2019:0152-1, openSUSE-SU-2019:1432-1, PAN-SA-2018-0015, RHSA-2018:3221-01, SA44073-2019-03, SSA:2018-226-01, SUSE-SU-2018:2486-1, SUSE-SU-2018:2492-1, SUSE-SU-2018:2683-1, SUSE-SU-2018:2928-1, SUSE-SU-2018:2965-1, SUSE-SU-2018:3864-1, SUSE-SU-2018:3864-2, SUSE-SU-2019:0197-1, SUSE-SU-2019:0512-1, SUSE-SU-2019:1553-1, TNS-2018-14, TNS-2018-17, TSB17568, USN-3628-1, USN-3628-2, USN-3692-1, USN-3692-2, VIGILANCE-VUL-25884.

Description of the vulnerability 

An attacker can bypass access restrictions to data via RSA Constant Time Key Generation of OpenSSL, in order to obtain sensitive information.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This cybersecurity note impacts software or systems such as Debian, VNX Operating Environment, VNX Series, Fedora, AIX, BladeCenter, IBM i, Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series, Juniper SBR, MariaDB ~ precise, MySQL Community, MySQL Enterprise, Nodejs Core, OpenBSD, OpenSSL, openSUSE Leap, Oracle Communications, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Solaris, Tuxedo, Oracle Virtual Directory, VirtualBox, WebLogic, Palo Alto Firewall PA***, PAN-OS, Percona Server, XtraBackup, Pulse Connect Secure, Pulse Secure Client, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Nessus, Ubuntu, X2GoClient.

Our Vigil@nce team determined that the severity of this computer weakness announce is low.

The trust level is of type confirmed by the editor, with an origin of user shell.

An attacker with a expert ability can exploit this cybersecurity vulnerability.

Solutions for this threat 

OpenSSL: version 1.1.0i.
The version 1.1.0i is fixed:
  https://www.openssl.org/source/

OpenSSL: version 1.0.2p.
The version 1.0.2p is fixed:
  https://www.openssl.org/source/

OpenSSL: patch for RSA Constant Time Key Generation.
A patch is indicated in information sources.

AIX: patch for OpenSSL.
A patch is available:
  https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp

Debian 8: new openssl packages.
New packages are available:
  Debian 8: openssl 1.0.1t-1+deb8u9

Debian 9: new openssl1.0 packages.
New packages are available:
  Debian 9: openssl1.0 1.0.2q-1~deb9u1

Debian 9: new openssl packages.
New packages are available:
  Debian 9: openssl 1.1.0j-1~deb9u1

Dell EMC VNXe3200: version 3.1.11.10003441.
The version 3.1.11.10003441 is fixed:
  https://www.dell.com/support/

Fedora 30: new compat-openssl10 packages.
New packages are available:
  Fedora 30: compat-openssl10 1.0.2o-7.fc30

IBM BigFix Platform: solution for Curl/OpenSSL.
The solution is indicated in information sources.

IBM BladeCenter: patch for OpenSSL.
A patch is available:
  http://www.ibm.com/support/fixcentral/

IBM i: patch for OpenSSL.
A patch is indicated in information sources.

Juniper SBR Carrier: versions 8.4.1R13 and 8.5.0R4.
Versions 8.4.1R13 and 8.5.0R4 are fixed:
  https://support.juniper.net/support/

Junos OS: fixed versions for OpenSSL.
Fixed versions are indicated in information sources.

MariaDB: version 5.5.63.
The version 5.5.63 is fixed:
  https://mariadb.com/downloads/

Nessus: version 7.1.4.
The version 7.1.4 is fixed:
  https://www.tenable.com/

Node Core: version 10.9.0.
The version 10.9.0 is fixed:
  https://nodejs.org/en/download/

Node Core: version 6.14.4.
The version 6.14.4 is fixed:
  https://nodejs.org/en/download/

Node Core: version 8.11.4.
The version 8.11.4 is fixed:
  https://nodejs.org/en/download/

OpenBSD: patch for OpenSSL DSA/ECDSA.
A patch is available:
  https://ftp.openbsd.org/pub/OpenBSD/patches/6.3/common/022_blinding.patch.sig

openSUSE Leap 15.0: new openssl-1_0_0 packages (05/10/2018).
New packages are available:
  openSUSE Leap 15.0: openssl-1_0_0 1.0.2p-lp150.2.6.1

openSUSE Leap 15.0: new openssl-1_1 packages.
New packages are available:
  openSUSE Leap 15.0: openssl-1_1 1.1.0i-lp150.3.18.1

openSUSE Leap 15.1: new openssl-1_0_0 packages.
New packages are available:
  openSUSE Leap 15.1: libopenssl1_0_0-1.0.2p-lp151.5.3.1, openssl-1_0_0 1.0.2p-lp151.5.3.1

openSUSE Leap 42.3: new compat-openssl098 packages.
New packages are available:
  openSUSE Leap 42.3: compat-openssl098 0.9.8j-24.1

openSUSE Leap 42.3: new openssl packages.
New packages are available:
  openSUSE Leap 42.3: openssl 1.0.2j-29.1

Oracle Communications: CPU of April 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2518758.1
  https://support.oracle.com/rs?type=doc&id=2518763.1
  https://support.oracle.com/rs?type=doc&id=2522151.1
  https://support.oracle.com/rs?type=doc&id=2519787.1
  https://support.oracle.com/rs?type=doc&id=2522126.1
  https://support.oracle.com/rs?type=doc&id=2522123.1
  https://support.oracle.com/rs?type=doc&id=2518753.1
  https://support.oracle.com/rs?type=doc&id=2522121.1
  https://support.oracle.com/rs?type=doc&id=2528862.1
  https://support.oracle.com/rs?type=doc&id=2518754.1

Oracle Communications: CPU of January 2019.
A Critical Patch Update is available:
  https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Oracle Communications: CPU of July 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2559239.1
  https://support.oracle.com/rs?type=doc&id=2563691.1
  https://support.oracle.com/rs?type=doc&id=2559240.1
  https://support.oracle.com/rs?type=doc&id=2559722.1
  https://support.oracle.com/rs?type=doc&id=2559225.1
  https://support.oracle.com/rs?type=doc&id=2559721.1
  https://support.oracle.com/rs?type=doc&id=2559256.1
  https://support.oracle.com/rs?type=doc&id=2559242.1
  https://support.oracle.com/rs?type=doc&id=2559243.1
  https://support.oracle.com/rs?type=doc&id=2559648.1

Oracle Fusion Middleware: CPU of Octobre 2018.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2433477.1

Oracle MySQL: version 5.6.43.
The version 5.6.43 is fixed:
  https://support.oracle.com/rs?type=doc&id=2487644.1
  https://www.mysql.com/fr/

Oracle MySQL: version 5.7.25.
The version 5.7.25 is fixed:
  https://support.oracle.com/rs?type=doc&id=2487644.1
  https://www.mysql.com/fr/

Oracle MySQL: version 8.0.14.
The version 8.0.14 is fixed:
  https://support.oracle.com/rs?type=doc&id=2487644.1
  https://www.mysql.com/fr/

Oracle Solaris: CPU of April 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2650589.1

Oracle Solaris: patch for third party software of July 2018 v3.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

Oracle VM VirtualBox: version 5.2.20.
The version 5.2.20 is fixed:
  https://www.virtualbox.org/

Palo Alto PAN-OS: fixed versions for OpenSSL.
Fixed versions are indicated in information sources.

Percona Server for MySQL: version 5.7.25-28.
The version 5.7.25-28 is fixed:
  https://www.percona.com/

Pulse Connect Secure, Pulse Secure Desktop: fixed versions for Multiple Vulnerabilities.
Fixed versions are indicated in information sources.

RHEL 7: new openssl packages.
New packages are available:
  RHEL 7: openssl 1.0.2k-16.el7

Slackware: new openssl packages.
New packages are available:
  Slackware 14.2: openssl 1.0.2p-*-1_slack14.2

SUSE LE 11 SP4: new openssl packages.
New packages are available:
  SUSE LE 11 SP4: openssl 0.9.8j-0.106.15.1

SUSE LE 12 RTM: new openssl packages (19/06/2019).
New packages are available:
  SUSE LE 12 RTM: openssl 1.0.1i-27.34.1

SUSE LE 12 SP1: new openssl packages (23/11/2018).
New packages are available:
  SUSE LE 12 SP1: openssl 1.0.1i-54.20.1

SUSE LE 12 SP1: new openssl packages (27/08/2018).
New packages are available:
  SUSE LE 12 SP1: openssl 1.0.1i-54.17.1

SUSE LE 12 SP2/3: new openssl packages.
New packages are available:
  SUSE LE 12 SP2: openssl 1.0.2j-60.39.1
  SUSE LE 12 SP3: openssl 1.0.2j-60.39.1

SUSE LE 12 SP3: new compat-openssl098 packages.
New packages are available:
  SUSE LE 12 SP3: compat-openssl098 0.9.8j-106.6.1

SUSE LE 12 SP4: new openssl-1_1 packages.
New packages are available:
  SUSE LE 12 SP4: openssl-1_1 1.1.1-2.6.1

SUSE LE 15: new openssl-1_0_0 packages.
New packages are available:
  SUSE LE 15 RTM: openssl-1_0_0 1.0.2p-3.8.1

SUSE LE 15: new openssl-1_1 packages.
New packages are available:
  SUSE LE 15 RTM: openssl-1_1 1.1.0i-4.18.1

Synology DSM: version 6.2.2-24922.
The version 6.2.2-24922 is fixed.

Synology DS/RS: version 6.2.2-24922.
The version 6.2.2-24922 is fixed:
  https://www.synology.com/

Tenable Nessus: version 8.0.0.
The version 8.0.0 is fixed:
  https://www.tenable.com/

Ubuntu: new libssl1.0.0 packages.
New packages are available:
  Ubuntu 17.10: libssl1.0.0 1.0.2g-1ubuntu13.5
  Ubuntu 16.04 LTS: libssl1.0.0 1.0.2g-1ubuntu4.12
  Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.25
  Ubuntu 12.04 ESM: libssl1.0.0 1.0.1-4ubuntu5.41

Ubuntu: new libssl1 packages.
New packages are available:
  Ubuntu 18.04 LTS: libssl1.0.0 1.0.2n-1ubuntu5.1, libssl1.1 1.1.0g-2ubuntu4.1
  Ubuntu 17.10: libssl1.0.0 1.0.2g-1ubuntu13.6
  Ubuntu 16.04 LTS: libssl1.0.0 1.0.2g-1ubuntu4.13
  Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.26
  Ubuntu 12.04 ESM: libssl1.0.0 1.0.1-4ubuntu5.43

X2Go Client for Windows: version 4.1.2.2-2020.02.13.
The version 4.1.2.2-2020.02.13 is fixed:
  http://wiki.x2go.org/doku.php/doc:release-notes-mswin:x2goclient-4.1.2.2

X2Go Client: version 4.1.2.0.
The version 4.1.2.0 is fixed:
  https://wiki.x2go.org/doku.php
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides an application vulnerability announce. The technology watch team tracks security threats targeting the computer system.