First published: Mon May 23 2016(Updated: )
It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures. A local attacker could possibly use this flaw to obtain a private DSA key belonging to another user or service running on the same system.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-httpd | <0:2.4.23-102.jbcs.el6 | 0:2.4.23-102.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2 | <0:1.12.0-9.jbcs.el6 | 0:1.12.0-9.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.0.2h-12.jbcs.el6 | 1:1.0.2h-12.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.23-102.jbcs.el7 | 0:2.4.23-102.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <0:1.12.0-9.jbcs.el7 | 0:1.12.0-9.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.0.2h-12.jbcs.el7 | 1:1.0.2h-12.jbcs.el7 |
redhat/openssl | <0:1.0.1e-48.el6_8.3 | 0:1.0.1e-48.el6_8.3 |
redhat/openssl | <1:1.0.1e-51.el7_2.7 | 1:1.0.1e-51.el7_2.7 |
redhat/jbcs-httpd24-openssl | <1:1.0.2h-13.jbcs.el6 | 1:1.0.2h-13.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.0.2h-13.jbcs.el7 | 1:1.0.2h-13.jbcs.el7 |
redhat/openssl | <1.0.1 | 1.0.1 |
redhat/openssl | <1.0.2 | 1.0.2 |
OpenSSL | =1.0.1 | |
OpenSSL | =1.0.1a | |
OpenSSL | =1.0.1b | |
OpenSSL | =1.0.1c | |
OpenSSL | =1.0.1d | |
OpenSSL | =1.0.1e | |
OpenSSL | =1.0.1f | |
OpenSSL | =1.0.1g | |
OpenSSL | =1.0.1h | |
OpenSSL | =1.0.1i | |
OpenSSL | =1.0.1j | |
OpenSSL | =1.0.1k | |
OpenSSL | =1.0.1l | |
OpenSSL | =1.0.1m | |
OpenSSL | =1.0.1n | |
OpenSSL | =1.0.1o | |
OpenSSL | =1.0.1p | |
OpenSSL | =1.0.1q | |
OpenSSL | =1.0.1r | |
OpenSSL | =1.0.1s | |
OpenSSL | =1.0.1t | |
OpenSSL | =1.0.2 | |
OpenSSL | =1.0.2a | |
OpenSSL | =1.0.2b | |
OpenSSL | =1.0.2c | |
OpenSSL | =1.0.2d | |
OpenSSL | =1.0.2e | |
OpenSSL | =1.0.2f | |
OpenSSL | =1.0.2g | |
OpenSSL | =1.0.2h | |
Oracle Linux | =5 | |
Oracle Linux | =6 | |
Oracle Linux | =7 | |
Oracle Solaris and Zettabyte File System (ZFS) | =10 | |
Oracle Solaris and Zettabyte File System (ZFS) | =11.3 | |
SUSE Linux Enterprise Server | =12.0 | |
Node.js | >=0.10.0<0.10.47 | |
Node.js | >=0.12.0<0.12.16 | |
Node.js | >=4.0.0<=4.1.2 | |
Node.js | >=4.2.0<4.6.0 | |
Node.js | >=5.0.0<6.7.0 | |
Debian | =8.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
debian/openssl | 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 3.0.15-1~deb12u1 3.0.14-1~deb12u2 3.4.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2016-2178 is rated as a high severity vulnerability due to its potential to allow attackers to obtain a private DSA key.
To fix CVE-2016-2178, you should upgrade to the patched versions of OpenSSL and related packages as specified in the security advisories.
CVE-2016-2178 affects systems using certain versions of OpenSSL that do not implement constant time operations for DSA signatures.
A local attacker can exploit CVE-2016-2178 to potentially gain access to private DSA keys belonging to other users or services on the same system.
While there are no specific public exploits reported for CVE-2016-2178, the nature of the vulnerability suggests it could be leveraged in targeted attacks.