Fixing OpenSSL Padding Oracle vulnerability (CVE-2016-2107)

This works well on my Ubuntu 14.04

Based on http://fearby.com/article/update-openssl-on-a-digital-ocean-vm/

Method1: $ sudo apt-get update $sudo apt-get install –only-upgrade libssl1.0.0 openssl #check if it patches successfully.

$ zgrep -ie “(CVE-2016-2108|CVE-2016-2107)” /usr/share/doc/libssl1.0.0/changelog.Debian.gz

Output should be like this:

  • debian/patches/CVE-2016-2107.patch: check that there are enough
    • CVE-2016-2107
    • debian/patches/CVE-2016-2108-1.patch: don’t mishandle zero if it is
    • debian/patches/CVE-2016-2108-2.patch: fix ASN1_INTEGER handling in
    • CVE-2016-2108

Method2: $ sudo apt-get dist-upgrade

$ wget ftp://ftp.openssl.org/source/openssl-1.0.2h.tar.gz $ tar -xvzf openssl-1.0.2h.tar.gz $ cd openssl-1.0.2h $ ./config –prefix=/usr/ $ make depend $ sudo make install $ openssl version

OpenSSL 1.0.2h 3 May 2016

now restart your nginx or other server

$ sudo service nginx restart

check your website here https://www.ssllabs.com/ssltest/

Leave a Reply

Your email address will not be published. Required fields are marked *