Red Hat Enterprise Linux: An updated virtio-win package that fixes several bugs and adds various
enhancements is now available for Red Hat Enterprise Linux 7.
Category Archives: Redhat
Redhat
RHBA-2015:0294-1: libdfp bug fix and enhancement update
Red Hat Enterprise Linux: Updated libdfp packages that fix several bugs and add various enhancements are
now available for Red Hat Enterprise Linux 7.
RHBA-2015:0295-1: virt-viewer bug fix and enhancement update
Red Hat Enterprise Linux: Updated virt-viewer packages that fix several bugs and add various enhancements
are now available for Red Hat Enterprise Linux 7.
Factoring RSA export keys – FREAK (CVE-2015-0204)
This week’s issue with OpenSSL export ciphersuites has been discussed in the press as “Freak” and “Smack”. These are addressed by CVE-2015-0204, and updates for affected Red Hat products were released in January.
Historically, the United States and several other countries tried to control the export or use of strong cryptographic primitives. For example, any company that exported cryptographic products from the United States needed to comply with certain key size limits. For RSA encryption, the maximum allowed key size was 512 bits and for symmetric encryption (DES at that time) it was 40 bits.
The U.S. government eventually lifted this policy and allowed cryptographic primitives with bigger key sizes to be exported. However, these export ciphersuites did not really go away and remained in a lot of codebases (including OpenSSL), probably for backward compatibility purposes.
It was considered safe to keep these export ciphersuites lying around for multiple purposes.
- Even if your webserver supports export ciphersuites, most modern browsers will not offer that as a part of initial handshake because they want to establish a session with strong cryptography.
- Even if you use export cipher suites, you still need to factor the 512 bit RSA key or brute-force the 40-bit DES key. Though doable in today’s cloud/GPU infrastructure, it is pointless to do this for a single session.
However, this results in a security flaw, which affects various cryptographic libraries, including OpenSSL. OpenSSL clients would accept RSA export-grade keys even when the client did not ask for export-grade RSA. This could further lead to an active man-in-the-middle attack, allowing decryption and alteration of the TLS session in the following way:
- An OpenSSL client contacts a TLS server and asks for a standard RSA key (non-export).
- A MITM intercepts this requests and asks the server for an export-grade RSA key.
- Once the server replies, the MITM attacker forwards this export-grade RSA key to the client. The client has a bug (as described above) that allows the export-grade key to be accepted.
- In the meantime, the MITM attacker factors this key and is able to decrypt all possible data exchange between the server and the client.
This issue was fixed in OpenSSL back in October of 2014 and shipped in January of 2015 in Red Hat Enterprise Linux 6 and 7 via RHSA-2015-0066. This issue has also been addressed in Fedora 20 and Fedora 21.
Red Hat Product Security initially classified this as having low security impact, but after more details about the issue and the possible attack scenarios have become clear, we re-classified it as a moderate-impact security issue.
Additional information on mitigating this vulnerability can be found on the Red Hat Customer Portal.
RHSA-2015:0286-1: Low: Red Hat Enterprise Linux 6.4 Extended Update Support Retirement Notice
Red Hat Enterprise Linux: This is the final notification for the retirement of Red Hat Enterprise
Linux 6.4 Extended Update Support (EUS). This notification applies only to
those customers subscribed to the Extended Update Support (EUS) channel for
Red Hat Enterprise Linux 6.4.
RHSA-2015:0287-1: Important: foreman-proxy security update
Red Hat Enterprise Linux: Updated foreman-proxy packages that fix one security issue are now
available for Red Hat Enterprise Linux OpenStack Platform Foreman.
Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
CVE-2014-3691
RHSA-2015:0288-1: Important: foreman-proxy security update
Red Hat Enterprise Linux: Updated foreman-proxy packages that fix one security issue are now
available for Red Hat Enterprise Linux OpenStack Platform 4.0.
Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
CVE-2014-3691
RHBA-2015:0279-1: sos bug fix update
Red Hat Enterprise Linux: An updated sos package that fixes one bug is now available for Red Hat
Enterprise Linux 7.
RHSA-2015:0285-1: Important: kernel security and bug fix update
Red Hat Enterprise Linux: Updated kernel packages that fix one security issue and three bugs are now
available for Red Hat Enterprise Linux 6.4 Extended Update Support.
Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
CVE-2014-7841
RHBA-2015:0282-1: Red Hat Network Tools rhnpush bug fix update
Red Hat Enterprise Linux: An updated rhnpush package that fixes one bug is now available for Red Hat
Network Tools.