{"type":"TYPE_SECURITY","shortCode":"RL","name":"RLSA-2023:0946","synopsis":"Important: openssl security and bug fix update","severity":"SEVERITY_IMPORTANT","topic":"An update is available for openssl.\nThis update affects Rocky Linux 9.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list","description":"OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286)\n\n* openssl: read buffer overflow in X.509 certificate verification (CVE-2022-4203)\n\n* openssl: timing attack in RSA Decryption implementation (CVE-2022-4304)\n\n* openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450)\n\n* openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215)\n\n* openssl: invalid pointer dereference in d2i_PKCS7 functions (CVE-2023-0216)\n\n* openssl: NULL dereference validating DSA public key (CVE-2023-0217)\n\n* openssl: NULL dereference during PKCS7 data verification (CVE-2023-0401)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* HMAC generation should reject key lengths < 112 bits or provide an indicator in FIPS mode (BZ#2144000)\n\n* In FIPS mode, openssl should set a minimum length for passwords in PBKDF2 (BZ#2144003)\n\n* stunnel consumes high amount of memory when pestered with TCP connections without a TLS handshake (BZ#2144008)\n\n* In FIPS mode, openssl should reject SHAKE as digest for RSA-OAEP or provide an indicator (BZ#2144010)\n\n* In FIPS mode, openssl should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator (BZ#2144012)\n\n* In FIPS mode, openssl should reject RSA signatures with X9.31 padding, or provide an indicator (BZ#2144015)\n\n* In FIPS mode, openssl should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 (BZ#2144017)\n\n* In FIPS mode, openssl should reject KDF input and output key lengths < 112 bits or provide an indicator (BZ#2144019)\n\n* In FIPS mode, openssl should reject RSA keys < 2048 bits when using EVP_PKEY_decapsulate, or provide an indicator (BZ#2145170)\n\n* Rocky Linux9.1 Nightly[0912] - error:03000093:digital envelope routines::command not supported when git clone is run with configured ibmca engine backed by libica.so.4 (OpenSSL 3.0) (BZ#2149010)\n\n* OpenSSL FIPS checksum code needs update (BZ#2158412)","solution":null,"affectedProducts":["Rocky Linux 9"],"fixes":[{"ticket":"2144000","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2144000","description":"* HMAC generation should reject key lengths < 112 bits or provide an indicator in FIPS mode"},{"ticket":"2144003","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2144003","description":"* In FIPS mode, openssl should set a minimum length for passwords in PBKDF2"},{"ticket":"2144006","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2144006","description":""},{"ticket":"2144008","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2144008","description":"* stunnel consumes high amount of memory when pestered with TCP connections without a TLS handshake"},{"ticket":"2144010","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2144010","description":"* In FIPS mode, openssl should reject SHAKE as digest for RSA-OAEP or provide an indicator"},{"ticket":"2144012","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2144012","description":"* In FIPS mode, openssl should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator"},{"ticket":"2144015","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2144015","description":"* In FIPS mode, openssl should reject RSA signatures with X9.31 padding, or provide an indicator"},{"ticket":"2144017","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2144017","description":"* In FIPS mode, openssl should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16"},{"ticket":"2144019","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2144019","description":"* In FIPS mode, openssl should reject KDF input and output key lengths < 112 bits or provide an indicator"},{"ticket":"2145170","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2145170","description":"* In FIPS mode, openssl should reject RSA keys < 2048 bits when using EVP_PKEY_decapsulate, or provide an indicator"},{"ticket":"2158412","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2158412","description":"* OpenSSL FIPS checksum code needs update"},{"ticket":"2164440","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2164440","description":""},{"ticket":"2164487","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2164487","description":""},{"ticket":"2164488","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2164488","description":""},{"ticket":"2164492","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2164492","description":""},{"ticket":"2164494","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2164494","description":""},{"ticket":"2164497","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2164497","description":""},{"ticket":"2164499","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2164499","description":""},{"ticket":"2164500","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2164500","description":""}],"cves":[{"name":"CVE-2022-4203","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-4203","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"4.9","cwe":"(CWE-119|CWE-125)"},{"name":"CVE-2022-4304","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-4304","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:N\/S:U\/C:N\/I:H\/A:N","cvss3BaseScore":"5.9","cwe":"UNKNOWN"},{"name":"CVE-2022-4450","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-4450","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"7.5","cwe":"CWE-415"},{"name":"CVE-2023-0215","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-0215","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"7.5","cwe":"CWE-416"},{"name":"CVE-2023-0216","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-0216","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"7.5","cwe":"UNKNOWN"},{"name":"CVE-2023-0217","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-0217","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"7.5","cwe":"UNKNOWN"},{"name":"CVE-2023-0286","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-0286","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:N\/S:U\/C:H\/I:N\/A:H","cvss3BaseScore":"7.4","cwe":"CWE-704"},{"name":"CVE-2023-0401","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-0401","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"7.5","cwe":"UNKNOWN"}],"references":[],"publishedAt":"2023-03-29T16:47:51.524711Z","rpms":{"Rocky Linux 9":{"nvras":["openssl-1:3.0.1-47.el9_1.aarch64.rpm","openssl-1:3.0.1-47.el9_1.ppc64le.rpm","openssl-1:3.0.1-47.el9_1.s390x.rpm","openssl-1:3.0.1-47.el9_1.src.rpm","openssl-1:3.0.1-47.el9_1.x86_64.rpm","openssl-debuginfo-1:3.0.1-47.el9_1.aarch64.rpm","openssl-debuginfo-1:3.0.1-47.el9_1.ppc64le.rpm","openssl-debuginfo-1:3.0.1-47.el9_1.s390x.rpm","openssl-debuginfo-1:3.0.1-47.el9_1.x86_64.rpm","openssl-debugsource-1:3.0.1-47.el9_1.aarch64.rpm","openssl-debugsource-1:3.0.1-47.el9_1.ppc64le.rpm","openssl-debugsource-1:3.0.1-47.el9_1.s390x.rpm","openssl-debugsource-1:3.0.1-47.el9_1.x86_64.rpm","openssl-devel-1:3.0.1-47.el9_1.aarch64.rpm","openssl-devel-1:3.0.1-47.el9_1.i686.rpm","openssl-devel-1:3.0.1-47.el9_1.ppc64le.rpm","openssl-devel-1:3.0.1-47.el9_1.s390x.rpm","openssl-devel-1:3.0.1-47.el9_1.x86_64.rpm","openssl-libs-1:3.0.1-47.el9_1.aarch64.rpm","openssl-libs-1:3.0.1-47.el9_1.i686.rpm","openssl-libs-1:3.0.1-47.el9_1.ppc64le.rpm","openssl-libs-1:3.0.1-47.el9_1.s390x.rpm","openssl-libs-1:3.0.1-47.el9_1.x86_64.rpm","openssl-libs-debuginfo-1:3.0.1-47.el9_1.aarch64.rpm","openssl-libs-debuginfo-1:3.0.1-47.el9_1.ppc64le.rpm","openssl-libs-debuginfo-1:3.0.1-47.el9_1.s390x.rpm","openssl-libs-debuginfo-1:3.0.1-47.el9_1.x86_64.rpm","openssl-perl-1:3.0.1-47.el9_1.aarch64.rpm","openssl-perl-1:3.0.1-47.el9_1.ppc64le.rpm","openssl-perl-1:3.0.1-47.el9_1.s390x.rpm","openssl-perl-1:3.0.1-47.el9_1.x86_64.rpm"]}},"rebootSuggested":false,"buildReferences":[]}

Rocky Linux: RLSA-2023:0946 openssl security and bug fix update

March 29, 2023
An update is available for openssl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list

Summary

An update is available for openssl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list


OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) * openssl: read buffer overflow in X.509 certificate verification (CVE-2022-4203) * openssl: timing attack in RSA Decryption implementation (CVE-2022-4304) * openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450) * openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215) * openssl: invalid pointer dereference in d2i_PKCS7 functions (CVE-2023-0216) * openssl: NULL dereference validating DSA public key (CVE-2023-0217) * openssl: NULL dereference during PKCS7 data verification (CVE-2023-0401) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * HMAC generation should reject key lengths < 112 bits or provide an indicator in FIPS mode (BZ#2144000) * In FIPS mode, openssl should set a minimum length for passwords in PBKDF2 (BZ#2144003) * stunnel consumes high amount of memory when pestered with TCP connections without a TLS handshake (BZ#2144008) * In FIPS mode, openssl should reject SHAKE as digest for RSA-OAEP or provide an indicator (BZ#2144010) * In FIPS mode, openssl should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator (BZ#2144012) * In FIPS mode, openssl should reject RSA signatures with X9.31 padding, or provide an indicator (BZ#2144015) * In FIPS mode, openssl should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 (BZ#2144017) * In FIPS mode, openssl should reject KDF input and output key lengths < 112 bits or provide an indicator (BZ#2144019) * In FIPS mode, openssl should reject RSA keys < 2048 bits when using EVP_PKEY_decapsulate, or provide an indicator (BZ#2145170) * Rocky Linux9.1 Nightly[0912] - error:03000093:digital envelope routines::command not supported when git clone is run with configured ibmca engine backed by libica.so.4 (OpenSSL 3.0) (BZ#2149010) * OpenSSL FIPS checksum code needs update (BZ#2158412)

RPMs

openssl-1:3.0.1-47.el9_1.aarch64.rpm

openssl-1:3.0.1-47.el9_1.ppc64le.rpm

openssl-1:3.0.1-47.el9_1.s390x.rpm

openssl-1:3.0.1-47.el9_1.src.rpm

openssl-1:3.0.1-47.el9_1.x86_64.rpm

openssl-debuginfo-1:3.0.1-47.el9_1.aarch64.rpm

openssl-debuginfo-1:3.0.1-47.el9_1.ppc64le.rpm

openssl-debuginfo-1:3.0.1-47.el9_1.s390x.rpm

openssl-debuginfo-1:3.0.1-47.el9_1.x86_64.rpm

openssl-debugsource-1:3.0.1-47.el9_1.aarch64.rpm

openssl-debugsource-1:3.0.1-47.el9_1.ppc64le.rpm

openssl-debugsource-1:3.0.1-47.el9_1.s390x.rpm

openssl-debugsource-1:3.0.1-47.el9_1.x86_64.rpm

openssl-devel-1:3.0.1-47.el9_1.aarch64.rpm

openssl-devel-1:3.0.1-47.el9_1.i686.rpm

openssl-devel-1:3.0.1-47.el9_1.ppc64le.rpm

openssl-devel-1:3.0.1-47.el9_1.s390x.rpm

openssl-devel-1:3.0.1-47.el9_1.x86_64.rpm

openssl-libs-1:3.0.1-47.el9_1.aarch64.rpm

openssl-libs-1:3.0.1-47.el9_1.i686.rpm

openssl-libs-1:3.0.1-47.el9_1.ppc64le.rpm

openssl-libs-1:3.0.1-47.el9_1.s390x.rpm

openssl-libs-1:3.0.1-47.el9_1.x86_64.rpm

openssl-libs-debuginfo-1:3.0.1-47.el9_1.aarch64.rpm

openssl-libs-debuginfo-1:3.0.1-47.el9_1.ppc64le.rpm

openssl-libs-debuginfo-1:3.0.1-47.el9_1.s390x.rpm

openssl-libs-debuginfo-1:3.0.1-47.el9_1.x86_64.rpm

openssl-perl-1:3.0.1-47.el9_1.aarch64.rpm

openssl-perl-1:3.0.1-47.el9_1.ppc64le.rpm

openssl-perl-1:3.0.1-47.el9_1.s390x.rpm

openssl-perl-1:3.0.1-47.el9_1.x86_64.rpm

References

No References

CVEs

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4203

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0216

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0217

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0401

Severity
Name: RLSA-2023:0946
Affected Products: Rocky Linux 9

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=2144000

https://bugzilla.redhat.com/show_bug.cgi?id=2144003

https://bugzilla.redhat.com/show_bug.cgi?id=2144006

https://bugzilla.redhat.com/show_bug.cgi?id=2144008

https://bugzilla.redhat.com/show_bug.cgi?id=2144010

https://bugzilla.redhat.com/show_bug.cgi?id=2144012

https://bugzilla.redhat.com/show_bug.cgi?id=2144015

https://bugzilla.redhat.com/show_bug.cgi?id=2144017

https://bugzilla.redhat.com/show_bug.cgi?id=2144019

https://bugzilla.redhat.com/show_bug.cgi?id=2145170

https://bugzilla.redhat.com/show_bug.cgi?id=2158412

https://bugzilla.redhat.com/show_bug.cgi?id=2164440

https://bugzilla.redhat.com/show_bug.cgi?id=2164487

https://bugzilla.redhat.com/show_bug.cgi?id=2164488

https://bugzilla.redhat.com/show_bug.cgi?id=2164492

https://bugzilla.redhat.com/show_bug.cgi?id=2164494

https://bugzilla.redhat.com/show_bug.cgi?id=2164497

https://bugzilla.redhat.com/show_bug.cgi?id=2164499

https://bugzilla.redhat.com/show_bug.cgi?id=2164500


Related News