compat-openssl11-1.1.1k-5.el9_6.1
エラータID: AXSA:2025-10498:01
The OpenSSL toolkit provides support for secure communications between machines. This version of OpenSSL package contains only the libraries from the 1.1.1 version and is provided for compatibility with previous releases.
Security Fix(es):
* openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2023-0286
There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.
Update packages.
There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.
N/A
SRPMS
- compat-openssl11-1.1.1k-5.el9_6.1.src.rpm
MD5: ad86d9a1fd0f57e0a33451a3f199cc67
SHA-256: de9d4508e15804d0a2303702e8c1a98f3a5eb2587159297fa908d197081d5931
Size: 7.27 MB
Asianux Server 9 for x86_64
- compat-openssl11-1.1.1k-5.el9_6.1.i686.rpm
MD5: 1104ef06dc858749056111a3099e0f80
SHA-256: 9a1513e3193c7dd40192d00818faf0f85b6780cabef27d415a0ae0d92272d95b
Size: 1.44 MB - compat-openssl11-1.1.1k-5.el9_6.1.x86_64.rpm
MD5: b5888eaf96884c31768f8b511a3d383f
SHA-256: 4515eeb9528a08ce6117ded775177b5f09c1acd01073695836833d44e93698e2
Size: 1.45 MB