openssl-1.0.1e-58.0.2.AXS4
エラータID: AXSA:2021-2478:04
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and
Transport Layer Security (TLS) protocols, as well as a full-strength
general-purpose cryptography library.
Security Fix(es):
* openssl: integer overflow in CipherUpdate (CVE-2021-23840)
* openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
(CVE-2021-23841)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
CVE-2021-23840
Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow
the output length argument in some cases where the input length is close to the
maximum permissable length for an integer on the platform. In such cases the
return value from the function call will be 1 (indicating success), but the
output length value will be negative. This could cause applications to behave
incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this
issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL
versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is
out of support and no longer receiving public updates. Premium support customers
of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j.
Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y
(Affected 1.0.2-1.0.2x).
CVE-2021-23841
The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create
a unique hash value based on the issuer and serial number data contained within
an X509 certificate. However it fails to correctly handle any errors that may
occur while parsing the issuer field (which might occur if the issuer field is
maliciously constructed). This may subsequently result in a NULL pointer deref
and a crash leading to a potential denial of service attack. The function
X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so
applications are only vulnerable if they use this function directly and they use
it on certificates that may have been obtained from untrusted sources. OpenSSL
versions 1.1.1i and below are affected by this issue. Users of these versions
should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected
by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving
public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to
1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected
1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
Additional info:
https://access.redhat.com/errata/RHSA-2021:3798
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841
Update packages.
The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
N/A
SRPMS
- openssl-1.0.1e-58.0.2.AXS4.src.rpm
MD5: d8687bc4dd3cac35fa22cede21ce461b
SHA-256: cfa86400ff343fd96d9235fcef3fa21d7cdbfe76268f6b57c9a3ac266032a81a
Size: 3.13 MB
Asianux Server 4 for x86
- openssl-1.0.1e-58.0.2.AXS4.i686.rpm
MD5: 5cf328101a69af43374aebd6be6634a2
SHA-256: 03036cd88ce8b001f9192a285277b2ab4122dbf865a2cb3b7f7b029a44cdd204
Size: 1.52 MB - openssl-devel-1.0.1e-58.0.2.AXS4.i686.rpm
MD5: 67e939960f59524253ed6747451d5762
SHA-256: d8a20df197927bf29118f3b5c868ae39e655c19ef16c5df7534bb9a7f5820e1a
Size: 1.17 MB
Asianux Server 4 for x86_64
- openssl-1.0.1e-58.0.2.AXS4.x86_64.rpm
MD5: d7f3ed986f87f1bee9cb76df670f2021
SHA-256: af4917f09c28b0d0094cecb0d18dc31e1eb18c28471b072b4a2f4a33138a5de9
Size: 1.53 MB - openssl-devel-1.0.1e-58.0.2.AXS4.x86_64.rpm
MD5: c8fdd090803b7a5d008cab37ecda056e
SHA-256: e0b7e8788680922c4ab115b001ce5f90e113451398315b76b7d96cc0b2b4ed22
Size: 1.17 MB - openssl-1.0.1e-58.0.2.AXS4.i686.rpm
MD5: 5cf328101a69af43374aebd6be6634a2
SHA-256: 03036cd88ce8b001f9192a285277b2ab4122dbf865a2cb3b7f7b029a44cdd204
Size: 1.52 MB - openssl-devel-1.0.1e-58.0.2.AXS4.i686.rpm
MD5: 67e939960f59524253ed6747451d5762
SHA-256: d8a20df197927bf29118f3b5c868ae39e655c19ef16c5df7534bb9a7f5820e1a
Size: 1.17 MB