openssl-1.1.1k-6.el8
エラータID: AXSA:2022-3132:04
Release date:
Tuesday, March 29, 2022 - 01:38
Subject:
openssl-1.1.1k-6.el8
Affected Channels:
Asianux Server 8 for x86_64
Severity:
High
Description:
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and
Transport Layer Security (TLS) protocols, as well as a full-strength
general-purpose cryptography library.
Security Fix(es):
openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
(CVE-2022-0778)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
CVE(s):
CVE-2022-0778
Solution:
Update packages.
CVEs:
CVE-2022-0778
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).
Additional Info:
N/A
Download:
SRPMS
- openssl-1.1.1k-6.el8.src.rpm
MD5: a63a647987e1adbecd9fc252a4e2fc44
SHA-256: 245cc2c71b10d770806bbc23b8fd08a6b91661ca34a441b315bb35ce77971c3c
Size: 7.29 MB
Asianux Server 8 for x86_64
- openssl-1.1.1k-6.el8.x86_64.rpm
MD5: 17bf85e42e12d55694156081a43afd8c
SHA-256: 274ee2e922a853e951d33dcd7e67d17797e51c5dfb504a25fe67c3a3899d5f54
Size: 707.84 kB - openssl-devel-1.1.1k-6.el8.x86_64.rpm
MD5: d2744dc6c98256eaf9726504ba7e4c18
SHA-256: a5ddc5e15b520e36cde66ec531d65504038595169392f3b24ec18ca0eaa5340c
Size: 2.33 MB - openssl-libs-1.1.1k-6.el8.x86_64.rpm
MD5: c377d658a82309970727dd91f19bca36
SHA-256: 7a9818871d79670475615cfbd28090ca4733e7eaa1b1713e7f59ae24a75d1002
Size: 1.47 MB - openssl-perl-1.1.1k-6.el8.x86_64.rpm
MD5: 8cbf9caf56aaa1ed2468c8a41930ded6
SHA-256: 2f5aad0a6aeef02b3b451f5a8a64e58de6e8ccc6b66e7bee3c5243f4ee88ff46
Size: 80.66 kB - openssl-devel-1.1.1k-6.el8.i686.rpm
MD5: a56cb70ad20255019ee00e8243378b0f
SHA-256: 7d5f7e86bacbd165161db3a31bd5fa592eb6687be4392b87858988ff91f8bf37
Size: 2.33 MB - openssl-libs-1.1.1k-6.el8.i686.rpm
MD5: b5b5297d20351e0845d052bc31bf2069
SHA-256: 22c71ef55a04afdd1f7ea6069281bce8490d197e036bce4f3deb0e426d8202f3
Size: 1.48 MB