As announced at the beginning of this week, OpenSSL has released the fix for CVE-2015-1793.
These releases will be made available on 9th July. They will fix a single security defect classified as "high" severity. This defect does not affect the 1.0.0 or 0.9.8 releases.
Forthcoming OpenSSL releases
More details and how to patch can be found below.

High Severity Patch
The patch is considered a high severity patch. The details are as follows, as published by the OpenSSL team.
During certificate verification, OpenSSL (starting from version 1.0.1n and 1.0.2b) will attempt to find an alternative certificate chain if the first attempt to build such a chain fails.
An error in the implementation of this logic can mean that an attacker could cause certain checks on untrusted certificates to be bypassed, such as the CA flag, enabling them to use a valid leaf certificate to act as a CA and "issue" an invalid certificate.
OpenSSL Security Advisory [9 Jul 2015]
This kind of vulnerability allows man-in-the-middle attacks and could cause applications to see invalid and untrusted SSL certificates as valid. It essentially allows everyone to be come their own Certificate Authority (CA).
The bug is fixed in commit aae41f8c54257d9fa6904d3a9aa09c5db6cefd0d.

And in commit 2aacec8f4a5ba1b365620a7b17fcce311ada93ad.

Pretty damn serious, indeed. That means it's patching time again.
The "upside" is that it only affects a limited set of OpenSSL versions: OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n and 1.0.1o.
Which versions & operating systems are affected?
The vulnerability appears to exist only in OpenSSL releases that happened in June 2015 and later. That leaves a lot of Linux distributions relatively safe, since they haven't gotten an OpenSSL update in a while.
Red Hat, CentOS and Ubuntu appear to be entirely unaffected by this vulnerability, since they had no OpenSSL updates since June 2015.
As confirmed by Red Hat 's announcement:
The OpenSSL project has published information about an important vulnerability (CVE-2015-1793) affecting openssl versions 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c. These upstream versions have only been available for a month, and given Red Hat's policy of performing careful backports of important bug fixes and selected features, this functionality is not present in any version of OpenSSL shipped in any Red Hat product.
No Red Hat products are affected by this flaw (CVE-2015-1793), so no actions need to be performed to fix or mitigate this issue in any way.
OpenSSL Security Fix of July 9th 2015 (CVE-2015-1793)
Just to be on the safe side, check for package updates and apply them ASAP if they're available. Especially if you have software that uses the latest OpenSSL source code or alternative repositories.
How to patch
As usual (ref: heartbleed, CVE-2015-0291 and CVE-2015-0286) with OpenSSL patches, it's a 2-step fix. First, update the library on your OS.
$ yum update openssl
or
$ apt-get update $ apt-get install openssl
Then, find all services that depend on the OpenSSL libraries, and restart them.
$ lsof | grep libssl | awk '{print $1}' | sort | uniq
Since the attack is a man-in-the-middle attack, it's advised to restart any service or application that communicates to a remote SSL/TLS endpoint.
If anyone manages to change either the DNS of your endpoint or modify the endpoint URL altogether, and point it to their own servers, your application may still accept it as a valid SSL/TLS stream.
Comments
Meghansh Thursday, July 9, 2015 at 17:04 (permalink)
So the openssl releases before 1.0.1n are not affected by this issue? Like openssl-1.0.1j?
Mike Campbell Thursday, July 9, 2015 at 20:35 (permalink)
“The vulnerability appears to exist only in OpenSSL releases that happened in June 2015 and later.”
“Red Hat, CentOS and Ubuntu appear to be entirely unaffected by this vulnerability, since they had no OpenSSL updates since June 2015.”
Not sure I understand what you’re saying with the above quotes. Ubuntu’s openssl package latest version is dated 2015-06-11 … ?
Mattias Geniar Thursday, July 9, 2015 at 22:06 (permalink)
The exact timings are unknown to me, but the bug that prompted CVE-2015-1793 was only introduced somewhere in June of this year.
Depending on the exact date, distros may have taken it into their packages. However, according to both Red Hat’s and Ubuntu’s advisories, all their distros are secure.
The only one in need of patching are the alphas/betas of Ubuntu 15.10, which have not “officially” been released.
Mike Campbell Friday, July 10, 2015 at 11:27 (permalink)
Gotcha; you’re right. It’s such a headache trying to work out what the packages actually are, sorry for being alarming!
Neo Friday, July 10, 2015 at 15:07 (permalink)
If a server doens’t use OpenSSL (for exemple windows web server), would browser clients using OpenSSL still be vulnerable? And if Yes, what should the server admin do? I’m guessing only the clients need to update their browser to a patched version.
Mattias Geniar Friday, July 10, 2015 at 15:12 (permalink)
Correct.
However, no modern webbrowser implemented this OpenSSL code, so unless you’re using something very specific, your clients are probably safe.
There’s nothing you, as a server admin, can do to keep your clients safe, except urge them to update all their software (if applicable).
pourya Wednesday, November 23, 2016 at 07:06 (permalink)
thank you
very nice …
Inbound links
- OpenSSL High Severity Vulnerability - Entrust, Inc.
- OpenSSL Release | blog.dasrecht.net
- High Severity Vulnerability Found In OpenSSL - Entrust, Inc.
- Certificate Forgery Vulnerability Found and Fixed in OpenSSL | Hackers Media
- CA Security Council | OpenSSL High Severity Vulnerability
- OpenSSLの脆弱性CVE-2015-1793について | ロードバランスすだちくん
- OpenSSLの脆弱性CVE-2015-1793について | cloudpack.media