OpenSSL: Multiple vulnerabilities Multiple vulnerabilities have been found in OpenSSL, the worst of which allows attackers to conduct a time based side-channel attack. openssl 2016-12-07 2016-12-07 581234 585142 585276 591454 592068 592074 592082 594500 595186 local, remote 1.0.2j 1.0.2j

OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general purpose cryptography library.

Multiple vulnerabilities have been discovered in OpenSSL. Please review the CVE identifiers and the International Association for Cryptologic Research’s (IACR) paper, “Make Sure DSA Signing Exponentiations Really are Constant-Time” for further details.

Remote attackers could cause a Denial of Service condition or have other unspecified impacts. Additionally, a time based side-channel attack may allow a local attacker to recover a private DSA key.

There is no known workaround at this time.

All OpenSSL users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.2j"
CVE-2016-2105 CVE-2016-2106 CVE-2016-2107 CVE-2016-2108 CVE-2016-2109 CVE-2016-2176 CVE-2016-2177 CVE-2016-2178 CVE-2016-2180 CVE-2016-2183 CVE-2016-6304 CVE-2016-6305 CVE-2016-6306 CVE-2016-7052 Make Sure DSA Signing Exponentiations Really are Constant-Time BlueKnight b-man