edk2-20220126gitbb1bba3d77-6.el8_9.3

エラータID: AXSA:2024-7542:02

Release date: 
Monday, February 26, 2024 - 14:50
Subject: 
edk2-20220126gitbb1bba3d77-6.el8_9.3
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Low
Description: 

EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM.

Security Fix(es):

* openssl: Excessive time spent checking DH keys and parameters (CVE-2023-3446)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2023-3446
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus ('p' parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the '-check' option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. edk2-20220126gitbb1bba3d77-6.el8_9.3.src.rpm
    MD5: cf9c24910c3536a456336066f3e6451a
    SHA-256: d0b52ea4328a9a306b54e19c1bac0bee8e75290b99ebf33e8466a0758f426724
    Size: 14.50 MB

Asianux Server 8 for x86_64
  1. edk2-ovmf-20220126gitbb1bba3d77-6.el8_9.3.noarch.rpm
    MD5: 7aa9c4cb59c8ed32f32820129d534f0e
    SHA-256: 2ad578a219f92ef9ea6e9fada0fcb6a7a5ffb0061c370bf7067efbc3731eea5d
    Size: 3.62 MB