-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openssl security and bug fix update Advisory ID: RHSA-2023:0946-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2023:0946 Issue date: 2023-02-28 CVE Names: CVE-2022-4203 CVE-2022-4304 CVE-2022-4450 CVE-2023-0215 CVE-2023-0216 CVE-2023-0217 CVE-2023-0286 CVE-2023-0401 ===================================================================== 1. Summary: An update for openssl is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 9) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux BaseOS (v. 9) - aarch64, ppc64le, s390x, x86_64 3. Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: read buffer overflow in X.509 certificate verification (CVE-2022-4203) * openssl: timing attack in RSA Decryption implementation (CVE-2022-4304) * openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450) * openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215) * openssl: invalid pointer dereference in d2i_PKCS7 functions (CVE-2023-0216) * openssl: NULL dereference validating DSA public key (CVE-2023-0217) * openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) * openssl: NULL dereference during PKCS7 data verification (CVE-2023-0401) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * HMAC generation should reject key lengths < 112 bits or provide an indicator in FIPS mode (BZ#2144000) * In FIPS mode, openssl should set a minimum length for passwords in PBKDF2 (BZ#2144003) * stunnel consumes high amount of memory when pestered with TCP connections without a TLS handshake (BZ#2144008) * In FIPS mode, openssl should reject SHAKE as digest for RSA-OAEP or provide an indicator (BZ#2144010) * In FIPS mode, openssl should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator (BZ#2144012) * In FIPS mode, openssl should reject RSA signatures with X9.31 padding, or provide an indicator (BZ#2144015) * In FIPS mode, openssl should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 (BZ#2144017) * In FIPS mode, openssl should reject KDF input and output key lengths < 112 bits or provide an indicator (BZ#2144019) * In FIPS mode, openssl should reject RSA keys < 2048 bits when using EVP_PKEY_decapsulate, or provide an indicator (BZ#2145170) * RHEL9.1 Nightly[0912] - error:03000093:digital envelope routines::command not supported when git clone is run with configured ibmca engine backed by libica.so.4 (OpenSSL 3.0) (BZ#2149010) * OpenSSL FIPS checksum code needs update (BZ#2158412) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. 5. Bugs fixed (https://bugzilla.redhat.com/): 2144000 - HMAC generation should reject key lengths < 112 bits or provide an indicator in FIPS mode [rhel-9.1.0.z] 2144003 - In FIPS mode, openssl should set a minimum length for passwords in PBKDF2 [rhel-9.1.0.z] 2144006 - FIPS self-test data for RSA-CRT contains incorrect parameters [rhel-9.1.0.z] 2144008 - stunnel consumes high amount of memory when pestered with TCP connections without a TLS handshake [rhel-9.1.0.z] 2144010 - In FIPS mode, openssl should reject SHAKE as digest for RSA-OAEP or provide an indicator [rhel-9.1.0.z] 2144012 - In FIPS mode, openssl should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator [rhel-9.1.0.z] 2144015 - In FIPS mode, openssl should reject RSA signatures with X9.31 padding, or provide an indicator [rhel-9.1.0.z] 2144017 - In FIPS mode, openssl should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 [rhel-9.1.0.z] 2144019 - In FIPS mode, openssl should reject KDF input and output key lengths < 112 bits or provide an indicator [rhel-9.1.0.z] 2145170 - In FIPS mode, openssl should reject RSA keys < 2048 bits when using EVP_PKEY_decapsulate, or provide an indicator [rhel-9.1.0.z] 2158412 - OpenSSL FIPS checksum code needs update [rhel-9.1.0.z] 2164440 - CVE-2023-0286 openssl: X.400 address type confusion in X.509 GeneralName 2164487 - CVE-2022-4304 openssl: timing attack in RSA Decryption implementation 2164488 - CVE-2022-4203 openssl: read buffer overflow in X.509 certificate verification 2164492 - CVE-2023-0215 openssl: use-after-free following BIO_new_NDEF 2164494 - CVE-2022-4450 openssl: double free after calling PEM_read_bio_ex 2164497 - CVE-2023-0216 openssl: invalid pointer dereference in d2i_PKCS7 functions 2164499 - CVE-2023-0217 openssl: NULL dereference validating DSA public key 2164500 - CVE-2023-0401 openssl: NULL dereference during PKCS7 data verification 6. Package List: Red Hat Enterprise Linux AppStream (v. 9): aarch64: openssl-debuginfo-3.0.1-47.el9_1.aarch64.rpm openssl-debugsource-3.0.1-47.el9_1.aarch64.rpm openssl-devel-3.0.1-47.el9_1.aarch64.rpm openssl-libs-debuginfo-3.0.1-47.el9_1.aarch64.rpm openssl-perl-3.0.1-47.el9_1.aarch64.rpm ppc64le: openssl-debuginfo-3.0.1-47.el9_1.ppc64le.rpm openssl-debugsource-3.0.1-47.el9_1.ppc64le.rpm openssl-devel-3.0.1-47.el9_1.ppc64le.rpm openssl-libs-debuginfo-3.0.1-47.el9_1.ppc64le.rpm openssl-perl-3.0.1-47.el9_1.ppc64le.rpm s390x: openssl-debuginfo-3.0.1-47.el9_1.s390x.rpm openssl-debugsource-3.0.1-47.el9_1.s390x.rpm openssl-devel-3.0.1-47.el9_1.s390x.rpm openssl-libs-debuginfo-3.0.1-47.el9_1.s390x.rpm openssl-perl-3.0.1-47.el9_1.s390x.rpm x86_64: openssl-debuginfo-3.0.1-47.el9_1.i686.rpm openssl-debuginfo-3.0.1-47.el9_1.x86_64.rpm openssl-debugsource-3.0.1-47.el9_1.i686.rpm openssl-debugsource-3.0.1-47.el9_1.x86_64.rpm openssl-devel-3.0.1-47.el9_1.i686.rpm openssl-devel-3.0.1-47.el9_1.x86_64.rpm openssl-libs-debuginfo-3.0.1-47.el9_1.i686.rpm openssl-libs-debuginfo-3.0.1-47.el9_1.x86_64.rpm openssl-perl-3.0.1-47.el9_1.x86_64.rpm Red Hat Enterprise Linux BaseOS (v. 9): Source: openssl-3.0.1-47.el9_1.src.rpm aarch64: openssl-3.0.1-47.el9_1.aarch64.rpm openssl-debuginfo-3.0.1-47.el9_1.aarch64.rpm openssl-debugsource-3.0.1-47.el9_1.aarch64.rpm openssl-libs-3.0.1-47.el9_1.aarch64.rpm openssl-libs-debuginfo-3.0.1-47.el9_1.aarch64.rpm ppc64le: openssl-3.0.1-47.el9_1.ppc64le.rpm openssl-debuginfo-3.0.1-47.el9_1.ppc64le.rpm openssl-debugsource-3.0.1-47.el9_1.ppc64le.rpm openssl-libs-3.0.1-47.el9_1.ppc64le.rpm openssl-libs-debuginfo-3.0.1-47.el9_1.ppc64le.rpm s390x: openssl-3.0.1-47.el9_1.s390x.rpm openssl-debuginfo-3.0.1-47.el9_1.s390x.rpm openssl-debugsource-3.0.1-47.el9_1.s390x.rpm openssl-libs-3.0.1-47.el9_1.s390x.rpm openssl-libs-debuginfo-3.0.1-47.el9_1.s390x.rpm x86_64: openssl-3.0.1-47.el9_1.x86_64.rpm openssl-debuginfo-3.0.1-47.el9_1.i686.rpm openssl-debuginfo-3.0.1-47.el9_1.x86_64.rpm openssl-debugsource-3.0.1-47.el9_1.i686.rpm openssl-debugsource-3.0.1-47.el9_1.x86_64.rpm openssl-libs-3.0.1-47.el9_1.i686.rpm openssl-libs-3.0.1-47.el9_1.x86_64.rpm openssl-libs-debuginfo-3.0.1-47.el9_1.i686.rpm openssl-libs-debuginfo-3.0.1-47.el9_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-4203 https://access.redhat.com/security/cve/CVE-2022-4304 https://access.redhat.com/security/cve/CVE-2022-4450 https://access.redhat.com/security/cve/CVE-2023-0215 https://access.redhat.com/security/cve/CVE-2023-0216 https://access.redhat.com/security/cve/CVE-2023-0217 https://access.redhat.com/security/cve/CVE-2023-0286 https://access.redhat.com/security/cve/CVE-2023-0401 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBY/3zh9zjgjWX9erEAQhxrBAAn8qLHFdqY5kOnqZPl4AVsYqhFEHJXJmF m+7RRNG/ECcrMKgcD+zMnutKhoCSkXfGWEyXBmk16i0d4Epl10sN59Dygwupd3Du uS2T6uAsaG6Uh4dxrmg6ROCuplRbRvUU3sbhkWNebnccrmSGfz9knqG5AgXONPKk KT5SOQwb/2jqQzu8P4rRzTC63qwOygA7zJB+XGw1htY4tUxOYsznDII8pgkirN0i 58CuQhIqpvCDiVNc87YJpXDy/vJt08EyW1OpeluCAmjemXylRMSnyZEAWEfZoIS8 tAoF6cbdgx+X7zf97plXmc9Av4x4X7fD9acwLsOp5v5OkNf7Bgn6mniyKPl/Cwr9 /Y2S9QyCNvAZy+Nm/fUOi+bBd2PLSHvgmM5C07mJrtBG0wLgdP+F8Iv5B8jqT3hC ky9UnVzaoD8A2/1FNrJrYfnIZlHu723wfx9N3WUWQSAKln3fPic/0Z7HKpm5gyPf gCLFCdMUSrfO8u2smc+yXPyyPmg14kaHTawxEQUztKB3QsRbedwAEL6aUBfwe7fK NWofAllHq/m368XvGqTsqHjAwo81i+L18v0f2ekQKOJ3/bQy80ZERS0l6u/DUtsO 3hwRoCLW7SyNW/3LKKAPExAnZlTqp67cSrUD2GdfLoOc4Mc7UZZjN154MHIjZq1D D6EiWOLrLsE= =ho5H -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce