-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openssl security and bug fix update Advisory ID: RHSA-2023:1199-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2023:1199 Issue date: 2023-03-14 CVE Names: CVE-2022-4203 CVE-2022-4304 CVE-2022-4450 CVE-2023-0215 CVE-2023-0216 CVE-2023-0217 CVE-2023-0286 CVE-2023-0401 ===================================================================== 1. Summary: An update for openssl is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream EUS (v.9.0) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux BaseOS EUS (v.9.0) - aarch64, ppc64le, s390x, x86_64 3. Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: read buffer overflow in X.509 certificate verification (CVE-2022-4203) * openssl: timing attack in RSA Decryption implementation (CVE-2022-4304) * openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450) * openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215) * openssl: invalid pointer dereference in d2i_PKCS7 functions (CVE-2023-0216) * openssl: NULL dereference validating DSA public key (CVE-2023-0217) * openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) * openssl: NULL dereference during PKCS7 data verification (CVE-2023-0401) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * HMAC generation should reject key lengths < 112 bits or provide an indicator in FIPS mode (BZ#2144001) * In FIPS mode, openssl should set a minimum length for passwords in PBKDF2 (BZ#2144004) * stunnel consumes high amount of memory when pestered with TCP connections without a TLS handshake (BZ#2144009) * In FIPS mode, openssl should reject SHAKE as digest for RSA-OAEP or provide an indicator (BZ#2144011) * In FIPS mode, openssl should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator (BZ#2144013) * In FIPS mode, openssl should reject RSA signatures with X9.31 padding, or provide an indicator (BZ#2144016) * In FIPS mode, openssl should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 (BZ#2144018) * In FIPS mode, openssl should reject KDF input and output key lengths < 112 bits or provide an indicator (BZ#2144020) * In FIPS mode, openssl should reject RSA keys < 2048 bits when using EVP_PKEY_decapsulate, or provide an indicator (BZ#2145171) * OpenSSL FIPS checksum code needs update (BZ#2158413) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. 5. Bugs fixed (https://bugzilla.redhat.com/): 2144001 - HMAC generation should reject key lengths < 112 bits or provide an indicator in FIPS mode [rhel-9.0.0.z] 2144004 - In FIPS mode, openssl should set a minimum length for passwords in PBKDF2 [rhel-9.0.0.z] 2144007 - FIPS self-test data for RSA-CRT contains incorrect parameters [rhel-9.0.0.z] 2144009 - stunnel consumes high amount of memory when pestered with TCP connections without a TLS handshake [rhel-9.0.0.z] 2144011 - In FIPS mode, openssl should reject SHAKE as digest for RSA-OAEP or provide an indicator [rhel-9.0.0.z] 2144013 - In FIPS mode, openssl should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator [rhel-9.0.0.z] 2144016 - In FIPS mode, openssl should reject RSA signatures with X9.31 padding, or provide an indicator [rhel-9.0.0.z] 2144018 - In FIPS mode, openssl should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 [rhel-9.0.0.z] 2144020 - In FIPS mode, openssl should reject KDF input and output key lengths < 112 bits or provide an indicator [rhel-9.0.0.z] 2145171 - In FIPS mode, openssl should reject RSA keys < 2048 bits when using EVP_PKEY_decapsulate, or provide an indicator [rhel-9.0.0.z] 2158413 - OpenSSL FIPS checksum code needs update [rhel-9.0.0.z] 2164440 - CVE-2023-0286 openssl: X.400 address type confusion in X.509 GeneralName 2164487 - CVE-2022-4304 openssl: timing attack in RSA Decryption implementation 2164488 - CVE-2022-4203 openssl: read buffer overflow in X.509 certificate verification 2164492 - CVE-2023-0215 openssl: use-after-free following BIO_new_NDEF 2164494 - CVE-2022-4450 openssl: double free after calling PEM_read_bio_ex 2164497 - CVE-2023-0216 openssl: invalid pointer dereference in d2i_PKCS7 functions 2164499 - CVE-2023-0217 openssl: NULL dereference validating DSA public key 2164500 - CVE-2023-0401 openssl: NULL dereference during PKCS7 data verification 6. Package List: Red Hat Enterprise Linux AppStream EUS (v.9.0): aarch64: openssl-debuginfo-3.0.1-46.el9_0.aarch64.rpm openssl-debugsource-3.0.1-46.el9_0.aarch64.rpm openssl-devel-3.0.1-46.el9_0.aarch64.rpm openssl-libs-debuginfo-3.0.1-46.el9_0.aarch64.rpm openssl-perl-3.0.1-46.el9_0.aarch64.rpm ppc64le: openssl-debuginfo-3.0.1-46.el9_0.ppc64le.rpm openssl-debugsource-3.0.1-46.el9_0.ppc64le.rpm openssl-devel-3.0.1-46.el9_0.ppc64le.rpm openssl-libs-debuginfo-3.0.1-46.el9_0.ppc64le.rpm openssl-perl-3.0.1-46.el9_0.ppc64le.rpm s390x: openssl-debuginfo-3.0.1-46.el9_0.s390x.rpm openssl-debugsource-3.0.1-46.el9_0.s390x.rpm openssl-devel-3.0.1-46.el9_0.s390x.rpm openssl-libs-debuginfo-3.0.1-46.el9_0.s390x.rpm openssl-perl-3.0.1-46.el9_0.s390x.rpm x86_64: openssl-debuginfo-3.0.1-46.el9_0.i686.rpm openssl-debuginfo-3.0.1-46.el9_0.x86_64.rpm openssl-debugsource-3.0.1-46.el9_0.i686.rpm openssl-debugsource-3.0.1-46.el9_0.x86_64.rpm openssl-devel-3.0.1-46.el9_0.i686.rpm openssl-devel-3.0.1-46.el9_0.x86_64.rpm openssl-libs-debuginfo-3.0.1-46.el9_0.i686.rpm openssl-libs-debuginfo-3.0.1-46.el9_0.x86_64.rpm openssl-perl-3.0.1-46.el9_0.x86_64.rpm Red Hat Enterprise Linux BaseOS EUS (v.9.0): Source: openssl-3.0.1-46.el9_0.src.rpm aarch64: openssl-3.0.1-46.el9_0.aarch64.rpm openssl-debuginfo-3.0.1-46.el9_0.aarch64.rpm openssl-debugsource-3.0.1-46.el9_0.aarch64.rpm openssl-libs-3.0.1-46.el9_0.aarch64.rpm openssl-libs-debuginfo-3.0.1-46.el9_0.aarch64.rpm ppc64le: openssl-3.0.1-46.el9_0.ppc64le.rpm openssl-debuginfo-3.0.1-46.el9_0.ppc64le.rpm openssl-debugsource-3.0.1-46.el9_0.ppc64le.rpm openssl-libs-3.0.1-46.el9_0.ppc64le.rpm openssl-libs-debuginfo-3.0.1-46.el9_0.ppc64le.rpm s390x: openssl-3.0.1-46.el9_0.s390x.rpm openssl-debuginfo-3.0.1-46.el9_0.s390x.rpm openssl-debugsource-3.0.1-46.el9_0.s390x.rpm openssl-libs-3.0.1-46.el9_0.s390x.rpm openssl-libs-debuginfo-3.0.1-46.el9_0.s390x.rpm x86_64: openssl-3.0.1-46.el9_0.x86_64.rpm openssl-debuginfo-3.0.1-46.el9_0.i686.rpm openssl-debuginfo-3.0.1-46.el9_0.x86_64.rpm openssl-debugsource-3.0.1-46.el9_0.i686.rpm openssl-debugsource-3.0.1-46.el9_0.x86_64.rpm openssl-libs-3.0.1-46.el9_0.i686.rpm openssl-libs-3.0.1-46.el9_0.x86_64.rpm openssl-libs-debuginfo-3.0.1-46.el9_0.i686.rpm openssl-libs-debuginfo-3.0.1-46.el9_0.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-4203 https://access.redhat.com/security/cve/CVE-2022-4304 https://access.redhat.com/security/cve/CVE-2022-4450 https://access.redhat.com/security/cve/CVE-2023-0215 https://access.redhat.com/security/cve/CVE-2023-0216 https://access.redhat.com/security/cve/CVE-2023-0217 https://access.redhat.com/security/cve/CVE-2023-0286 https://access.redhat.com/security/cve/CVE-2023-0401 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZBCPddzjgjWX9erEAQiQuw/8CUVfDSTb3gfZ8T8Tb6iRry2p653SIsp4 J50gCZ1eJRnCx3RBDWhouXXXLH/ESf2u8nD5rGzJ0zA2vjc4dWkA9wcUyMQ6QGrT AgjQNJf/KI7DODToHuUMbMNjJFKA5t+ud3BwReunqu+sf8LKB5Fvk9LtqEHgeLd9 DOFGHpn1MVUtArM4UD70lLlAy4wJeh5MnOpoPTkMm05BPfOtoyIVc4PdqzBnEAar 2GayTN1mJR+Tu4mW6XL0n9bMBRdA9LFw0Vny3FBIS8jcYL9gx8kPNWgAMoEZjBtj 912A3tyPOREYsIuht9VUrDEmioyg3tFkaFaNO4wetHOAkdgYpAchfKuT/Rhh2iox nieXpN2w62dEJHL244mmw+OPZg/Jd7APnqxuc1Py2R/Bt3bw59A8ayDbKDe69Ok6 mQQYQkO/3J6dq4D0zx/rzBvtI1jHgmEqg4c4/U5m0DceJqi6+zfVgZ6S1O/ar+Oe UeTRqz41VeEu3gkQnApRNeUm6vNfKGBsDKiZXccEIYBBnG/qolX4lr6P4anMDPAM zY4B1oOGjmekX6ARDFgNLYRmpVSeAJo97rI6HPrZdxFiCIuWsgLbPjNkfXeDHGwj 5BSI8ja1hVVQxwc5OkSpWBGJGvGjk51h+Lj4kMd5ysUZiSMFrKJCKbWuNLdORtez WAvn9jyg9Og= =10y4 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce