edk2-20220126gitbb1bba3d77-6.el8_9.3
エラータID: AXSA:2024-7542:02
リリース日:
2024/02/26 Monday - 14:50
題名:
edk2-20220126gitbb1bba3d77-6.el8_9.3
影響のあるチャネル:
Asianux Server 8 for x86_64
Severity:
Low
Description:
以下項目について対処しました。
[Security Fix]
- OpenSSL の DH_check()、DH_check_ex()、および
EVP_PKEY_param_check() 関数には、大きすぎる母数を用いて
DH パラメーターのチェック処理を実行してしまう問題があるため、
リモートの攻撃者により、細工された DH キーを介して、サービス
拒否攻撃を可能とする脆弱性が存在します。(CVE-2023-3446)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2023-3446
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus ('p' parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the '-check' option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus ('p' parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the '-check' option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
追加情報:
N/A
ダウンロード:
SRPMS
- edk2-20220126gitbb1bba3d77-6.el8_9.3.src.rpm
MD5: cf9c24910c3536a456336066f3e6451a
SHA-256: d0b52ea4328a9a306b54e19c1bac0bee8e75290b99ebf33e8466a0758f426724
Size: 14.50 MB
Asianux Server 8 for x86_64
- edk2-ovmf-20220126gitbb1bba3d77-6.el8_9.3.noarch.rpm
MD5: 7aa9c4cb59c8ed32f32820129d534f0e
SHA-256: 2ad578a219f92ef9ea6e9fada0fcb6a7a5ffb0061c370bf7067efbc3731eea5d
Size: 3.62 MB