Security Notices

2015-07-09 Alternative chains certificate forgery (CVE-2015-1793)

A recent vulnerability was discovered that affect several OpenSSL versions: 1.0.2c, 1.0.2b, 1.0.1n and 1.0.1o. This issue will impact any application that verifies certificates including SSL/TLS/DTLS clients and SSL/TLS/DTLS servers using client authentication.

Find more information about the issue.

Affected platforms

Check the OpenSSL version that you are currently using with the following command:

$ /opt/bitnami/common/bin/openssl version

This issue affects OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n and 1.0.1o.

NOTE: Bitnami Cloud Hosting servers are not affected, as they do not ship any of these versions.

How to patch it

To prevent malicious users from exploiting the vulnerability in the server, update the OpenSSL version by following the steps below:

  • Patch the library located in the /opt/bitnami directory, by downloading and installing an update for your platform.

    • For Ubuntu Linux 12.04 64-bit systems:

      $ wget
    • For Ubuntu Linux 12.04 32-bit systems:

      $ wget
  • Install the patch using the commands below:

      $ chmod +x ./
      $ sudo ./

The patch will check if your installation is vulnerable and if so, update the library version to a safe one. At the end of the patching process, it will ask for permission to restart your services (recommended) so the changes take effect. It will also save all the updated files in the /opt/bitnami/opensslfix directory and the replaced files (in case they are needed to perform a rollback) in the /opt/bitnami/opensslfix/backup/ directory.


Apache fails to start after applying this patch

This usually happens because of some binary incompatibility. The installer will allow you to restore the installation back to its previous state, as shown below:

Apache configuration seems to fail after applying the patch. Do you want to restore to the previous state? [Y/n]:

Select “Y” to go back to the working (but vulnerable) version. If the rollback process fails, manually copy the files from the backup directory, as shown below:

$ cp -rp /opt/bitnami/opensslfix/backup/* /opt/bitnami/common
$ /opt/bitnami/ restart apache

Next, execute the OpenSSL Fixer as follows, with the --forceversioned 1 parameter:

$ chmod +x ./
$ sudo ./  --forceversioned 1

Please direct any questions you have about this issue on our github repository so we can help you troubleshoot the issue.

Last modification June 29, 2022