Skip to content

Commit 3008184

Browse files
committed
Blog: OpenSSL January 2017 (#1114)
PR-URL: #1114
1 parent a4c373a commit 3008184

1 file changed

Lines changed: 38 additions & 0 deletions

File tree

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
date: 2017-01-27T11:49:06.146Z
3+
category: vulnerability
4+
title: OpenSSL update, 1.0.2k
5+
slug: openssl-january-2017
6+
layout: blog-post.hbs
7+
author: Rod Vagg
8+
---
9+
10+
The OpenSSL project has [announced](https://mta.openssl.org/pipermail/openssl-announce/2017-January/000092.html) the immediate availability of OpenSSL version 1.0.2k.
11+
12+
Although the OpenSSL team have determined a maximum severity rating of "moderate", the Node.js crypto team (Ben Noordhuis, Shigeki Ohtsu and Fedor Indutny) have determined the impact to Node users is "low". Details on this determination can be found below.
13+
14+
We will therefore be scheduling releases of all active release lines (7 "Current", 6 "LTS Boron", 4 "LTS Argon") on Tuesday the 31st of January. As releases are made, they will appear on the [nodejs.org news feed](http://nodejs.org/en/blog/) and this post will also be updated with details.
15+
16+
## Node.js Impact Assessment
17+
18+
### [CVE-2017-3731](https://www.openssl.org/news/vulnerabilities.html#2017-3731): Truncated packet could crash via OOB read
19+
20+
This is a moderate severity flaw in OpenSSL. By default, Node.js disables RC4 so most users are not affected. As RC4 can be enabled programmatically, it is possible for a Node.js developer to craft code that may be vulnerable to this flaw. Any user activating RC4 in their codebase should prioritise this update.
21+
22+
All active versions of Node.js **are affected**, but the severity is very low for most users.
23+
24+
### [CVE-2017-3730](https://www.openssl.org/news/vulnerabilities.html#2017-3730): Bad DHE and ECDHE parameters cause a client crash
25+
26+
Because this flaw only impacts OpenSSL 1.1.0 and no active Node.js release line currently bundles this version, Node.js is **not affected**.
27+
28+
### [CVE-2017-3732](https://www.openssl.org/news/vulnerabilities.html#2017-3732): BN_mod_exp may produce incorrect results on x86_64
29+
30+
As noted by the OpenSSL team, the likelihood of being able to craft a practical attack that uses this flaw is very low. In addition, Node.js enables `SSL_OP_SINGLE_DH_USE`, further decreasing the chance of a successful exploit of this vulnerability in a Node.js service.
31+
32+
All active versions of Node.js **are affected**, but the severity is very low for Node.js users.
33+
34+
### [CVE-2016-7055](https://www.openssl.org/news/vulnerabilities.html#2016-7055): Montgomery multiplication may produce incorrect results
35+
36+
Some calculations, when run on an Intel Broadwell or later CPU, can produce in erroneous results. This flaw has been previously discussed by the Node.js team [on GitHub](https://github.com/nodejs/node/issues/9594). It is not believed that practical attacks can be crafted to exploit this vulnerability except in very specific circumstances. Therefore this is a low severity flaw.
37+
38+
All active versions of Node.js **are affected**, but the severity is very low for Node.js users.

0 commit comments

Comments
 (0)