aws

Security Notices

2016-09-22 OpenSSL OCSP Status Request extension unbounded memory growth (CVE-2016-6304)

A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. You can find out more information about it in the OpenSSL Security Advisory.

Affected platforms

Check the OpenSSL version that you are currently using with the following command:

$ /opt/bitnami/common/bin/openssl version

OpenSSL versions prior to 1.0.1u, 1.0.2i and 1.1.0a are vulnareble and allow malicious client to exhaust the server’s memory.

Secure the system

To secure your server, you need to update the OpenSSL version included in the system and the OpenSSL included in the Bitnami installation.

NOTE: At the time we wrote this documentation the packages of the other distributions have not been released

Debian

Follow the steps below:

  • Update the system OpenSSL library with these commands:

      $ sudo apt-get update
      $ sudo apt-get install -y openssl libssl1.0.0
    
  • Check that the version was updated (please note the “built on” date):

      $ /usr/bin/openssl version -a
      OpenSSL 1.0.1t  3 May 2016
      built on: Thu Sep 22 06:42:20 2016
    
  • Restart any service using libssl:

      $ sudo /opt/bitnami/ctlscript.sh restart
    

Ubuntu

Follow the steps below:

  • Update the system OpenSSL library with these commands:

      $ sudo apt-get update
      $ sudo apt-get install -y openssl libssl1.0.0
    
  • Check that the version was updated (please note the “built on” date):

      $ /usr/bin/openssl version -a
      OpenSSL 1.0.1f 6 Jan 2014
      built on: Thu Sep 22 17:59:24 UTC 2016
    
  • Restart any service using libssl:

      $ sudo /opt/bitnami/ctlscript.sh restart
    

Red Hat

Follow the steps below:

  • Update the system OpenSSL library with these commands:

      $ sudo yum -y update openssl
    
  • Check that the version was updated (please note the “built on” date):

      $ /usr/bin/openssl version -a
      OpenSSL 1.0.1e-fips 11 Feb 2013
      built on: Thu Sep 22 05:31:09 EDT 2016
    
  • Restart any service using libssl:

      $ sudo /opt/bitnami/ctlscript.sh restart
    

Oracle Linux

Follow the steps below:

  • Update the system OpenSSL library with these commands:

      $ sudo yum -y update openssl
    
  • Check that the version was updated (please note the “built on” date):

      $ /usr/bin/openssl version -a
      OpenSSL 1.0.1e-fips 11 Feb 2013
      built on: Tue Sep 27 05:35:00 PDT 2016
    
  • Restart any service using libssl:

      $ sudo /opt/bitnami/ctlscript.sh restart
    

CentOS

Follow the steps below:

  • Update the system OpenSSL library with these commands:

      $ sudo yum -y update openssl
    
  • Check that the version was updated (please note the “built on” date):

      $ /usr/bin/openssl version -a
      OpenSSL 1.0.1e-fips 11 Feb 2013
      built on: Tue Sep 27 13:37:25 UTC 2016
    
  • Restart any service using libssl:

      $ sudo /opt/bitnami/ctlscript.sh restart
    

Amazon Linux

Follow the steps below:

  • Update the system OpenSSL library with these commands:

      $ sudo yum -y update openssl
    
  • Check that the version was updated (please note the “built on” date):

      $ /usr/bin/openssl version -a
      OpenSSL 1.0.1k-fips 8 Jan 2015
      built on: Thu Sep 22 19:07:16 2016
    
  • Restart any service using libssl:

      $ sudo /opt/bitnami/ctlscript.sh restart
    

How to patch the Bitnami installation

To prevent malicious users from exploiting the vulnerability in the server, update the OpenSSL version by following the steps below:

The patch will check if your installation is vulnerable and if so, update the library version to a safe one. At the end of the patching process, it will ask for permission to restart your services (recommended) so the changes take effect. It will also save all the updated files in the /opt/bitnami/opensslfix directory and the replaced files (in case they are needed to perform a rollback) in the /opt/bitnami/opensslfix/backup/ directory.

Troubleshooting

Apache fails to start after applying this patch

This usually happens because of some binary incompatibility. The installer will allow you to restore the installation back to its previous state, as shown below:

Apache configuration seems to fail after applying the patch. Do you want to restore to the previous state? [Y/n]:

Select “Y” to go back to the working (but vulnerable) version. If the rollback process fails, manually copy the files from the backup directory, as shown below:

$ cp -rp /opt/bitnami/opensslfix/backup/* /opt/bitnami/common
$ /opt/bitnami/ctlscript.sh restart apache

Please direct any questions you have about this issue on our github repository so we can help you troubleshoot the issue.

Last modification December 21, 2022