openssl-1.1.1k-12.el8_9

エラータID: AXSA:2024-7354:01

Release date: 
Thursday, January 11, 2024 - 02:13
Subject: 
openssl-1.1.1k-12.el8_9
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Low
Description: 

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.

Security Fix(es):

* openssl: Excessive time spent checking DH keys and parameters (CVE-2023-3446)
* OpenSSL: Excessive time spent checking DH q parameter value (CVE-2023-3817)
* openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow (CVE-2023-5678)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2023-3446
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus ('p' parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the '-check' option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
CVE-2023-3817
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the "-check" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
CVE-2023-5678
Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn't make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn't check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the "-pubcheck" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. openssl-1.1.1k-12.el8_9.src.rpm
    MD5: 986a4b436cf0428060c9e5292410f8c2
    SHA-256: 9474e97d955fbf6aa9726e6a090d2c5501bff44e2c57e70346cb655ce20739dc
    Size: 7.38 MB

Asianux Server 8 for x86_64
  1. openssl-1.1.1k-12.el8_9.x86_64.rpm
    MD5: 2c2440081fe41a1b567873084be9a265
    SHA-256: 4f6b77855cba726f29e18d70df4e9e3a63781d490b5c029646c229b088917676
    Size: 709.59 kB
  2. openssl-devel-1.1.1k-12.el8_9.i686.rpm
    MD5: 9d8043c76959884b044128485bad9677
    SHA-256: 541bafceb58411b507234027f09cc326cd36046cc9b9b38b09964288ff932eb5
    Size: 2.33 MB
  3. openssl-devel-1.1.1k-12.el8_9.x86_64.rpm
    MD5: cd6dda18153493c3da4f98eea58059be
    SHA-256: dd249fb43e508f475f7fd6ac99a67b234775569880084c03f58f275bb6f9fd02
    Size: 2.33 MB
  4. openssl-libs-1.1.1k-12.el8_9.i686.rpm
    MD5: fd39926583bc1e4a3fcc388768b35f9f
    SHA-256: 9f52b20f884835c6f21a51d32355092de4cc49da78e11279e77e4ac2a422c1a7
    Size: 1.48 MB
  5. openssl-libs-1.1.1k-12.el8_9.x86_64.rpm
    MD5: b9571633a167813b8cadd2cd706d0450
    SHA-256: a9e9e43613db68f79515cc6f649678ec91429c1b1c98c81741a8fb0beccfdbac
    Size: 1.47 MB
  6. openssl-perl-1.1.1k-12.el8_9.x86_64.rpm
    MD5: 52ea6d2debea4a4f279b461641a3ec52
    SHA-256: 0ba5b23fed7ad855e02b7e1b380a2560f54dd2ee1c5bcd2ed8887c031786d526
    Size: 82.38 kB