openssl-1.0.1e-58.0.2.AXS4
エラータID: AXSA:2021-2478:04
リリース日:
2021/10/15 Friday - 03:22
題名:
openssl-1.0.1e-58.0.2.AXS4
影響のあるチャネル:
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- OpenSSL の公開 API である X509_issuer_and_serial_hash() には、X509 証明書の
発行者フィールドが悪意を持って構築されている場合、発行者フィールドを解析中に
エラーを正しく処理することに失敗する問題があり、NULL ポインタデリファレンスを
引き起こし、サービス拒否に繋がるクラッシュを発生させる脆弱性があります。
なお、X509_issuer_and_serial_hash() が OpenSSL から直接呼ばれることは無く、
アプリケーションが直接その関数を呼び出して、信頼できないソースから取得した
証明書のために使用する場合にのみ問題が発生します。(CVE-2021-23841)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2021-23841
The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
追加情報:
N/A
ダウンロード:
SRPMS
- openssl-1.0.1e-58.0.2.AXS4.src.rpm
MD5: d8687bc4dd3cac35fa22cede21ce461b
SHA-256: cfa86400ff343fd96d9235fcef3fa21d7cdbfe76268f6b57c9a3ac266032a81a
Size: 3.13 MB
Asianux Server 4 for x86
- openssl-1.0.1e-58.0.2.AXS4.i686.rpm
MD5: 5cf328101a69af43374aebd6be6634a2
SHA-256: 03036cd88ce8b001f9192a285277b2ab4122dbf865a2cb3b7f7b029a44cdd204
Size: 1.52 MB - openssl-devel-1.0.1e-58.0.2.AXS4.i686.rpm
MD5: 67e939960f59524253ed6747451d5762
SHA-256: d8a20df197927bf29118f3b5c868ae39e655c19ef16c5df7534bb9a7f5820e1a
Size: 1.17 MB
Asianux Server 4 for x86_64
- openssl-1.0.1e-58.0.2.AXS4.x86_64.rpm
MD5: d7f3ed986f87f1bee9cb76df670f2021
SHA-256: af4917f09c28b0d0094cecb0d18dc31e1eb18c28471b072b4a2f4a33138a5de9
Size: 1.53 MB - openssl-devel-1.0.1e-58.0.2.AXS4.x86_64.rpm
MD5: c8fdd090803b7a5d008cab37ecda056e
SHA-256: e0b7e8788680922c4ab115b001ce5f90e113451398315b76b7d96cc0b2b4ed22
Size: 1.17 MB - openssl-1.0.1e-58.0.2.AXS4.i686.rpm
MD5: 5cf328101a69af43374aebd6be6634a2
SHA-256: 03036cd88ce8b001f9192a285277b2ab4122dbf865a2cb3b7f7b029a44cdd204
Size: 1.52 MB - openssl-devel-1.0.1e-58.0.2.AXS4.i686.rpm
MD5: 67e939960f59524253ed6747451d5762
SHA-256: d8a20df197927bf29118f3b5c868ae39e655c19ef16c5df7534bb9a7f5820e1a
Size: 1.17 MB