Bugzilla – Bug 921312
VUL-0: CVE-2015-2318, CVE-2015-2319, CVE-2015-2320: mono, mono-core: multiple TLS vulnerabilities (TLS impersonation, SSLv2 support, FREAK)
Last modified: 2018-12-12 07:44:20 UTC
Via oss-sec http://seclists.org/oss-sec/2015/q1/772 > A TLS impersonation attack was discovered in Mono's TLS stack by > researchers at Inria. During checks on our TLS stack, we have > discovered two further issues which we have fixed - SSLv2 support, and > vulnerability to FREAK. These vulnerabilities affect basically every > Mono version ever released. > All three issues should be addressed in the following patches: > > https://github.com/mono/mono/commit/1509226c41d74194c146deb173e752b8d3cdeec4 > https://github.com/mono/mono/commit/9c38772f094168d8bfd5bc73bf8925cd04faad10 > https://github.com/mono/mono/commit/b371da6b2d68b4cdd0f21d6342af6c42794f998b > > These patches should apply to all Mono versions from 3.4.0 or so > onwards. The EXPORT cipher removal patch requires slight modification > in order to apply to Mono releases prior to 3.x - > https://gist.github.com/directhex/728af6f96d1b8c976659 should work for > these users. The Impersonation patch requires slight modification to > apply to Mono releases prior to 3.4 - > https://gist.github.com/directhex/f8c6e67f551d8a608154 should work for > these users. > > Alternatively, this is fixed in Mono 3.12.1 and higher: > http://download.mono-project.com/sources/mono/mono-3.12.1.tar.bz2 > > Linux and Mac downloads from www.mono-project.com have been updated to > 3.12.1 - the Windows release will take another day or two. > > Below is a (non-exhaustive) list of Mono versions in use in supported > distributions, and the patches they require for full coverage. > > 2.4 branch (Ubuntu 10.04) - SSLv2 patch, Modified Impersonation patch, > Modified FREAK patch > 2.6.7 (Debian 6, SLES 11) - SSLv2 patch, Modified Impersonation patch, > Modified FREAK patch > 2.10.8 (Fedora 19, 20, 21) - SSLv2 patch, Modified Impersonation > patch, Modified FREAK patch > 2.10.8.1 (Debian 7, Ubuntu 12.04) - SSLv2 patch, Modified > Impersonation patch, Modified FREAK patch > 3.0.3 (openSUSE 12.3) - SSLv2 patch, Modified Impersonation patch, > FREAK patch > 3.0.6 (openSUSE 13.1) - SSLv2 patch, Modified Impersonation patch, > FREAK patch > 3.2.8 (Debian 8, Ubuntu 12.10, 14.10, 15.04, Gentoo) - SSLv2 patch, > Modified Impersonation patch, FREAK patch > 3.10.0 (Arch) - SSLv2 patch, Impersonation patch, FREAK patch
bugbot adjusting priority
Filed https://build.opensuse.org/request/show/290204
Mike - can you look into this...
An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2015-03-31. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/61127
CVEs assigned in http://seclists.org/oss-sec/2015/q1/869: https://github.com/mono/mono/commit/1509226c41d74194c146deb173e752b8d3cdeec4 The commit message says "TLS protocol: add handshake state validation" but this is also referenced as "The Impersonation patch" and "A TLS impersonation attack was discovered in Mono's TLS stack by researchers at Inria." Although there isn't a description of what impersonation vulnerability existed, almost certainly it is "SKIP-TLS ... Mono: default TLS library vulnerable to client impersonation. Version 3.12.1 prevents the attack" as listed on the https://www.smacktls.com web site. Use CVE-2015-2318 for the https://www.smacktls.com SKIP-TLS issue in Mono. https://github.com/mono/mono/commit/9c38772f094168d8bfd5bc73bf8925cd04faad10 The commit message says "Remove the EXPORT ciphers and related code path" - this directly matches "The EXPORT cipher removal patch" but it is apparently also referenced as "FREAK patch" and "vulnerability to FREAK." (It is conceivable that 1509226c41d74194c146deb173e752b8d3cdeec4 would also be applicable to FREAK attacks.) Use CVE-2015-2319 for the https://www.smacktls.com FREAK issue in Mono. https://github.com/mono/mono/commit/b371da6b2d68b4cdd0f21d6342af6c42794f998b The commit message says "Remove the client-side SSLv2 fallback," which apparently matches both "SSLv2 support" and "SSLv2 patch." MITRE does currently accept reports from authors of SSL/TLS code who want to characterize their own SSLv2 support, after a recent drop of support, as a vulnerability (i.e., "These vulnerabilities affect ..." in http://www.openwall.com/lists/oss-security/2015/03/07/2 together with https://uk.linkedin.com/in/directhex). Use CVE-2015-2320 for b371da6b2d68b4cdd0f21d6342af6c42794f998b.
SUSE-SU-2015:0841-1: An update that contains security fixes can now be installed. Category: security (moderate) Bug References: 921312 CVE References: Sources used: SUSE Linux Enterprise Software Development Kit 11 SP3 (src): mono-core-2.6.7-0.13.1 SUSE Linux Enterprise Server 11 SP3 for VMware (src): mono-core-2.6.7-0.13.1 SUSE Linux Enterprise Server 11 SP3 (src): mono-core-2.6.7-0.13.1 SUSE Linux Enterprise Desktop 11 SP3 (src): mono-core-2.6.7-0.13.1
released apparently.