Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1180184 - (CVE-2015-0204, FREAK) CVE-2015-0204 openssl: only allow ephemeral RSA keys in export ciphersuites (FREAK)
CVE-2015-0204 openssl: only allow ephemeral RSA keys in export ciphersuites (...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20150106,repor...
: Security
Depends On: 1180189 1181014 1181015 1181016 1181017 1181018 1182870 1182871 1182872 1202953 1293298
Blocks: 1180194 1192260 1192263 1212496
  Show dependency treegraph
 
Reported: 2015-01-08 10:14 EST by Vasyl Kaigorodov
Modified: 2017-06-19 07:27 EDT (History)
38 users (show)

See Also:
Fixed In Version: OpenSSL 1.0.1k, OpenSSL 1.0.0p, OpenSSL 0.9.8zd
Doc Type: Bug Fix
Doc Text:
It was discovered that OpenSSL would accept ephemeral RSA keys when using non-export RSA cipher suites. A malicious server could make a TLS/SSL client using OpenSSL use a weaker key exchange method.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:0066 normal SHIPPED_LIVE Moderate: openssl security update 2015-01-21 21:28:18 EST
Red Hat Product Errata RHSA-2015:0800 normal SHIPPED_LIVE Moderate: openssl security update 2015-04-13 11:54:05 EDT
Red Hat Product Errata RHSA-2015:0849 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 6.4.0 update 2015-04-16 15:39:06 EDT
Red Hat Product Errata RHSA-2016:1650 normal SHIPPED_LIVE Important: Red Hat JBoss Web Server 2.1.1 security update 2016-08-22 18:07:23 EDT

  None (edit)
Description Vasyl Kaigorodov 2015-01-08 10:14:13 EST
New release of OpenSSL [1] fixes the following issue:

OpenSSL clients would tolerate temporary RSA keys in non-export
ciphersuites. It also had an option SSL_OP_EPHEMERAL_RSA which
enabled this server side. Remove both options as they are a
protocol violation.

Upstream patches:
- master: https://github.com/openssl/openssl/commit/ce325c60c74b0fa784f5872404b722e120e5cab0
- 0.9.8: https://github.com/openssl/openssl/commit/72f181539118828ca966a0f8d03f6428e2bcf0d6
- 1.0.1: https://github.com/openssl/openssl/commit/37580f43b5a39f5f4e920d17273fab9713d3a744

[1]: https://www.openssl.org/news/changelog.html
Comment 1 Vasyl Kaigorodov 2015-01-08 10:22:15 EST
Created openssl tracking bugs for this issue:

Affects: fedora-all [bug 1180189]
Comment 5 Huzaifa S. Sidhpurwala 2015-01-15 23:08:29 EST
Statement:

This issue affects versions of openssl as shipped with Red Hat Enterprise Linux 5, 6 and 7. Errata have been released to correct this issue.

This issue affects the version of openssl098e as shipped with Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this issue as having Moderate security impact and does not plan to address this flaw for the openssl098e component in any future security updates.

This issue affects the version of openssl097a as shipped with Red Hat Enterprise Linux 5. Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
Comment 7 errata-xmlrpc 2015-01-21 16:28:49 EST
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 7

Via RHSA-2015:0066 https://rhn.redhat.com/errata/RHSA-2015-0066.html
Comment 10 Huzaifa S. Sidhpurwala 2015-03-04 05:44:28 EST
Red Hat Product Security team initially classified this as having low security impact, but after more details about the issue and the possible attack scenarios become clear, we re-classified as moderate impact security issue.
Comment 11 Tomas Hoger 2015-03-04 06:59:34 EST
This issue got dubbed FREAK (Factoring RSA Export Keys).  Further details can be found in:

https://www.smacktls.com/#freak
http://blog.cryptographyengineering.com/2015/03/attack-of-week-freak-or-factoring-nsa.html
Comment 12 Matt Wilkinson 2015-03-04 10:31:07 EST
Is there going to be a patch for RHEL 5? It looks like there are fixes for this in RHEL 6 and 7 but not yet for RHEL 5, at least not that I can find.
Comment 13 Robert Scheck 2015-03-05 11:49:17 EST
Huzaifa, are there still no plans for an update for RHEL 5 even this has been
re-classified meanwhile?
Comment 14 Matt Goldman 2015-03-05 12:06:31 EST
Matt, Robert:

RHEL 5 has entered Production Phase 3 as of January 31, 2014. As per our errata policy:
    
    "During the Production 3 Phase, Critical impact Security Advisories (RHSAs) and selected Urgent Priority Bug Fix Advisories (RHBAs) may be released as they become available."
    Red Hat Enterprise Linux Life Cycle
    https://access.redhat.com/support/policy/updates/errata#Production_3_Phase

This means that Red Hat will not be addressing Low, Moderate, or High impact CVE's in relation to RHEL 5.
Comment 15 john.haxby@oracle.com 2015-03-05 12:17:55 EST
I have some sympathy with comment #14.  This is not a serious problem and all the screaming in the popular press (just search google for "openssl freak") doesn't make it serious either.  Mind you, some of the popular press makes it sound like armageddon all over again.
Comment 16 errata-xmlrpc 2015-04-13 07:54:11 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5

Via RHSA-2015:0800 https://rhn.redhat.com/errata/RHSA-2015-0800.html
Comment 17 Robert Scheck 2015-04-13 09:12:27 EDT
May somebody explain how comment #16 works together with comment #14, please?
Comment 18 Ján Rusnačko 2015-04-13 09:26:09 EDT
(In reply to Robert Scheck from comment #17)
> May somebody explain how comment #16 works together with comment #14, please?
Please read the statement in comment 5, it is updated and should explain the current status.
Comment 22 Tomas Hoger 2015-04-15 11:07:09 EDT
This issue is now listed as fixed in Oracle Java SE 5.0u85 and 6u95:

http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html#AppendixJAVA

According to the release notes:

http://www.oracle.com/technetwork/java/javase/documentation/overview-156328.html#bugfixes-6u95

  Area: security-libs/javax.net.ssl
  Synopsis: The EXPORT suites have been removed from the default enabled
  ciphersuite list.

  The EXPORT strength ciphersuites (such as SSL_RSA_EXPORT_WITH_DES40_CBC_SHA,
  SSL_RSA_EXPORT_WITH_RC4_40_MD5) were recently shown as too weak to be
  practically used in secure communications. They are no longer enabled by
  default.

  See 8074458 (not public).

the actual change is removal of EXPORT cipher suites form the set of cipher suites enabled by default.  Hence CVE-2015-0204 is incorrectly used for Oracle JDK, as there's following noted use as part of the CVE-2015-0204 description:

  NOTE: the scope of this CVE is only client code based on OpenSSL, not
  EXPORT_RSA issues associated with servers or other TLS implementations.
Comment 23 errata-xmlrpc 2015-04-16 11:39:18 EDT
This issue has been addressed in the following products:

  JBoss Enterprise Application Platform 6.4.0

Via RHSA-2015:0849 https://rhn.redhat.com/errata/RHSA-2015-0849.html
Comment 29 errata-xmlrpc 2016-08-22 14:08:32 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Web Server 2.1.1

Via RHSA-2016:1650 https://rhn.redhat.com/errata/RHSA-2016-1650.html

Note You need to log in before you can comment on or make changes to this bug.