Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:3408: Red Hat Security Advisory: openssl security update

An update for openssl is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP, and RSASVE.
  • CVE-2022-4450: A double-free vulnerability was found in OpenSSL’s PEM_read_bio_ex function. The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the “name” (for example, “CERTIFICATE”), any header data, and the payload data. If the function succeeds, then the “name_out,” “header,” and “data” arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. Constructing a PEM file that results in 0 bytes of payload data is possible. In this case, PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a freed buffer. A double-free will occur if the caller also frees this buffer. This will most likely lead to a crash. This could be exploited by an attacker who can supply malicious PEM files for parsing to achieve a denial of service attack.
  • CVE-2023-0215: A use-after-free vulnerability was found in OpenSSL’s BIO_new_NDEF function. The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally by OpenSSL to support the SMIME, CMS, and PKCS7 streaming capabilities, but it may also be called directly by end-user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions. For example, if a CMS recipient public key is invalid, the new filter BIO is freed, and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up, and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then calls BIO_pop() on the BIO, a use-after-free will occur, possibly resulting in a crash.
Red Hat Security Data
#vulnerability#linux#red_hat#dos#perl#ibm#sap#ssl

Synopsis

Moderate: openssl security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for openssl is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.

Security Fix(es):

  • openssl: timing attack in RSA Decryption implementation (CVE-2022-4304)
  • openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450)
  • openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2164487 - CVE-2022-4304 openssl: timing attack in RSA Decryption implementation
  • BZ - 2164492 - CVE-2023-0215 openssl: use-after-free following BIO_new_NDEF
  • BZ - 2164494 - CVE-2022-4450 openssl: double free after calling PEM_read_bio_ex

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM

openssl-1.1.1k-9.el8_6.src.rpm

SHA-256: 1304e95feab01cabe4f3140a5168f4e161daae4e1a65aab16de2c688cda85daf

x86_64

openssl-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 45af165fade232ce1dee1f40fa2a23f85d82bc8cee4f47fa25226bdd89b310cb

openssl-debuginfo-1.1.1k-9.el8_6.i686.rpm

SHA-256: b61441473f9581e3fcd73f5e63b3b216fd8280d7f37be7c435441d9eef82e112

openssl-debuginfo-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 6095fb89678f723fd3b6eac4c70aec620c0be35672d9987e54505742a411ae15

openssl-debugsource-1.1.1k-9.el8_6.i686.rpm

SHA-256: 6bdc601538c032bc2ffad0faef241bd42c2b5b78ff8aeb4ff19cbf2342483306

openssl-debugsource-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 19aef1d43ccc628d73edc3d173035c25d4a09985570cbff7006dac9ca1c85b2b

openssl-devel-1.1.1k-9.el8_6.i686.rpm

SHA-256: 14843be2fcaa07745c4a249c2c4c4622f6b07cfe0c396fce305929027c11fd53

openssl-devel-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 517b8ba885b5869b841fb55a68f00d35063a676b31eb935aeef7535a8de4585a

openssl-libs-1.1.1k-9.el8_6.i686.rpm

SHA-256: 960f4512af66f02d90460643923ceac9e18bf239c03ff4e665d6622e8784d1c1

openssl-libs-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 218b390ed038cf27278e6cd4c7c022be35339a4414a3094bc452eadf3e686048

openssl-libs-debuginfo-1.1.1k-9.el8_6.i686.rpm

SHA-256: 8052b333f7f0c02650299a0480c8ce9dc54c4a1124fd213866d8528568aec575

openssl-libs-debuginfo-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: d8f92911e8f69b64aaef2632631c285685542bf01b9c0ed4dac6e7d136be971d

openssl-perl-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 5b6b5ce24036dca17852e533068b3fa6a9574de9b3bc9abe251aabe28f061181

Red Hat Enterprise Linux Server - AUS 8.6

SRPM

openssl-1.1.1k-9.el8_6.src.rpm

SHA-256: 1304e95feab01cabe4f3140a5168f4e161daae4e1a65aab16de2c688cda85daf

x86_64

openssl-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 45af165fade232ce1dee1f40fa2a23f85d82bc8cee4f47fa25226bdd89b310cb

openssl-debuginfo-1.1.1k-9.el8_6.i686.rpm

SHA-256: b61441473f9581e3fcd73f5e63b3b216fd8280d7f37be7c435441d9eef82e112

openssl-debuginfo-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 6095fb89678f723fd3b6eac4c70aec620c0be35672d9987e54505742a411ae15

openssl-debugsource-1.1.1k-9.el8_6.i686.rpm

SHA-256: 6bdc601538c032bc2ffad0faef241bd42c2b5b78ff8aeb4ff19cbf2342483306

openssl-debugsource-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 19aef1d43ccc628d73edc3d173035c25d4a09985570cbff7006dac9ca1c85b2b

openssl-devel-1.1.1k-9.el8_6.i686.rpm

SHA-256: 14843be2fcaa07745c4a249c2c4c4622f6b07cfe0c396fce305929027c11fd53

openssl-devel-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 517b8ba885b5869b841fb55a68f00d35063a676b31eb935aeef7535a8de4585a

openssl-libs-1.1.1k-9.el8_6.i686.rpm

SHA-256: 960f4512af66f02d90460643923ceac9e18bf239c03ff4e665d6622e8784d1c1

openssl-libs-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 218b390ed038cf27278e6cd4c7c022be35339a4414a3094bc452eadf3e686048

openssl-libs-debuginfo-1.1.1k-9.el8_6.i686.rpm

SHA-256: 8052b333f7f0c02650299a0480c8ce9dc54c4a1124fd213866d8528568aec575

openssl-libs-debuginfo-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: d8f92911e8f69b64aaef2632631c285685542bf01b9c0ed4dac6e7d136be971d

openssl-perl-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 5b6b5ce24036dca17852e533068b3fa6a9574de9b3bc9abe251aabe28f061181

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6

SRPM

openssl-1.1.1k-9.el8_6.src.rpm

SHA-256: 1304e95feab01cabe4f3140a5168f4e161daae4e1a65aab16de2c688cda85daf

s390x

openssl-1.1.1k-9.el8_6.s390x.rpm

SHA-256: 964774781a487d2e1953df2c360edc98389f50045390b8bf2833aa59eb05fb60

openssl-debuginfo-1.1.1k-9.el8_6.s390x.rpm

SHA-256: 2303f62e56e38197cd8c2a4c5b161a89418cbd04a42568028ba58ccfd0e8ba30

openssl-debugsource-1.1.1k-9.el8_6.s390x.rpm

SHA-256: be0359fd2e9001fd0bcf0d37e5b3fddd3c707cdc1626589529a180944f3c9760

openssl-devel-1.1.1k-9.el8_6.s390x.rpm

SHA-256: 2d8498edd06ae506f19bcf7e4273234d8f82cd785b95eb81664b36ac7d167fe4

openssl-libs-1.1.1k-9.el8_6.s390x.rpm

SHA-256: aa2b53c6296997658f8090a9b2b028fb77d6bacc7730e32f7a926b07d1b79ef8

openssl-libs-debuginfo-1.1.1k-9.el8_6.s390x.rpm

SHA-256: 515cd056d20ffafb5705dd4f82256366cd49b6cf0352f1ad635191ebafad64e2

openssl-perl-1.1.1k-9.el8_6.s390x.rpm

SHA-256: a628452c4e80b5473b94489ec592ab595c20914c79361282df5c2a18fe97c73a

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM

openssl-1.1.1k-9.el8_6.src.rpm

SHA-256: 1304e95feab01cabe4f3140a5168f4e161daae4e1a65aab16de2c688cda85daf

ppc64le

openssl-1.1.1k-9.el8_6.ppc64le.rpm

SHA-256: f52fbc17b87b279732f62a8c8c3a12410483926dc24e533d59c3dc1942ef359f

openssl-debuginfo-1.1.1k-9.el8_6.ppc64le.rpm

SHA-256: 7100ae33b73b182c5c834542c6c897e50f75a31aebf9ab60de403ce5276ccf68

openssl-debugsource-1.1.1k-9.el8_6.ppc64le.rpm

SHA-256: b55b3b57f8aac25352fdda50ecd73621037ddf3058a115b7a701a7132380b4f2

openssl-devel-1.1.1k-9.el8_6.ppc64le.rpm

SHA-256: d934db726df45deb814c70464501d987e4639ef9d7688305aeb4f885e96985ee

openssl-libs-1.1.1k-9.el8_6.ppc64le.rpm

SHA-256: 4b1bce7c435fb1535fd3289a583d00787db9a9c090d4e0ac49168d55c21ec295

openssl-libs-debuginfo-1.1.1k-9.el8_6.ppc64le.rpm

SHA-256: c8fa6cb0745c789d1783ae6326c3aa8de88f6f1b1600f711acf2ba8a4121166d

openssl-perl-1.1.1k-9.el8_6.ppc64le.rpm

SHA-256: ef5bb72af300b45d8bf232d60c6944dc11dd7f09836abe5d510777f32a3344ab

Red Hat Enterprise Linux Server - TUS 8.6

SRPM

openssl-1.1.1k-9.el8_6.src.rpm

SHA-256: 1304e95feab01cabe4f3140a5168f4e161daae4e1a65aab16de2c688cda85daf

x86_64

openssl-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 45af165fade232ce1dee1f40fa2a23f85d82bc8cee4f47fa25226bdd89b310cb

openssl-debuginfo-1.1.1k-9.el8_6.i686.rpm

SHA-256: b61441473f9581e3fcd73f5e63b3b216fd8280d7f37be7c435441d9eef82e112

openssl-debuginfo-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 6095fb89678f723fd3b6eac4c70aec620c0be35672d9987e54505742a411ae15

openssl-debugsource-1.1.1k-9.el8_6.i686.rpm

SHA-256: 6bdc601538c032bc2ffad0faef241bd42c2b5b78ff8aeb4ff19cbf2342483306

openssl-debugsource-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 19aef1d43ccc628d73edc3d173035c25d4a09985570cbff7006dac9ca1c85b2b

openssl-devel-1.1.1k-9.el8_6.i686.rpm

SHA-256: 14843be2fcaa07745c4a249c2c4c4622f6b07cfe0c396fce305929027c11fd53

openssl-devel-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 517b8ba885b5869b841fb55a68f00d35063a676b31eb935aeef7535a8de4585a

openssl-libs-1.1.1k-9.el8_6.i686.rpm

SHA-256: 960f4512af66f02d90460643923ceac9e18bf239c03ff4e665d6622e8784d1c1

openssl-libs-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 218b390ed038cf27278e6cd4c7c022be35339a4414a3094bc452eadf3e686048

openssl-libs-debuginfo-1.1.1k-9.el8_6.i686.rpm

SHA-256: 8052b333f7f0c02650299a0480c8ce9dc54c4a1124fd213866d8528568aec575

openssl-libs-debuginfo-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: d8f92911e8f69b64aaef2632631c285685542bf01b9c0ed4dac6e7d136be971d

openssl-perl-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 5b6b5ce24036dca17852e533068b3fa6a9574de9b3bc9abe251aabe28f061181

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6

SRPM

openssl-1.1.1k-9.el8_6.src.rpm

SHA-256: 1304e95feab01cabe4f3140a5168f4e161daae4e1a65aab16de2c688cda85daf

aarch64

openssl-1.1.1k-9.el8_6.aarch64.rpm

SHA-256: 698e69c97e3d74fa3079ef1d5718700d6d4e23402565242fa93cd14da9bc5117

openssl-debuginfo-1.1.1k-9.el8_6.aarch64.rpm

SHA-256: 4bef6bbc84ca8cb557aa287127a6f087e4145d01388002f45bf1ebd6366a86b6

openssl-debugsource-1.1.1k-9.el8_6.aarch64.rpm

SHA-256: e18f0725309e8b4a11dcc2e915e65bc45d357909108bb5797833b323e8f251c6

openssl-devel-1.1.1k-9.el8_6.aarch64.rpm

SHA-256: 7fbf3c89e670aa1565c28bc73bdb2fc328727896a49f47a257365d9bb479ef87

openssl-libs-1.1.1k-9.el8_6.aarch64.rpm

SHA-256: 81ad26f1ce613e3670e009a275623403c00b3ca416a15c7ddfc82a5545e75de9

openssl-libs-debuginfo-1.1.1k-9.el8_6.aarch64.rpm

SHA-256: a817e2005d34a6b1104d4a2c4aeaff0011cff49969b5b096d624812ce8ab33b6

openssl-perl-1.1.1k-9.el8_6.aarch64.rpm

SHA-256: 011a7c0e868c99488c3da1d7df0614c7352ec83cb10416b420206fd1b8e24f5f

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM

openssl-1.1.1k-9.el8_6.src.rpm

SHA-256: 1304e95feab01cabe4f3140a5168f4e161daae4e1a65aab16de2c688cda85daf

ppc64le

openssl-1.1.1k-9.el8_6.ppc64le.rpm

SHA-256: f52fbc17b87b279732f62a8c8c3a12410483926dc24e533d59c3dc1942ef359f

openssl-debuginfo-1.1.1k-9.el8_6.ppc64le.rpm

SHA-256: 7100ae33b73b182c5c834542c6c897e50f75a31aebf9ab60de403ce5276ccf68

openssl-debugsource-1.1.1k-9.el8_6.ppc64le.rpm

SHA-256: b55b3b57f8aac25352fdda50ecd73621037ddf3058a115b7a701a7132380b4f2

openssl-devel-1.1.1k-9.el8_6.ppc64le.rpm

SHA-256: d934db726df45deb814c70464501d987e4639ef9d7688305aeb4f885e96985ee

openssl-libs-1.1.1k-9.el8_6.ppc64le.rpm

SHA-256: 4b1bce7c435fb1535fd3289a583d00787db9a9c090d4e0ac49168d55c21ec295

openssl-libs-debuginfo-1.1.1k-9.el8_6.ppc64le.rpm

SHA-256: c8fa6cb0745c789d1783ae6326c3aa8de88f6f1b1600f711acf2ba8a4121166d

openssl-perl-1.1.1k-9.el8_6.ppc64le.rpm

SHA-256: ef5bb72af300b45d8bf232d60c6944dc11dd7f09836abe5d510777f32a3344ab

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM

openssl-1.1.1k-9.el8_6.src.rpm

SHA-256: 1304e95feab01cabe4f3140a5168f4e161daae4e1a65aab16de2c688cda85daf

x86_64

openssl-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 45af165fade232ce1dee1f40fa2a23f85d82bc8cee4f47fa25226bdd89b310cb

openssl-debuginfo-1.1.1k-9.el8_6.i686.rpm

SHA-256: b61441473f9581e3fcd73f5e63b3b216fd8280d7f37be7c435441d9eef82e112

openssl-debuginfo-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 6095fb89678f723fd3b6eac4c70aec620c0be35672d9987e54505742a411ae15

openssl-debugsource-1.1.1k-9.el8_6.i686.rpm

SHA-256: 6bdc601538c032bc2ffad0faef241bd42c2b5b78ff8aeb4ff19cbf2342483306

openssl-debugsource-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 19aef1d43ccc628d73edc3d173035c25d4a09985570cbff7006dac9ca1c85b2b

openssl-devel-1.1.1k-9.el8_6.i686.rpm

SHA-256: 14843be2fcaa07745c4a249c2c4c4622f6b07cfe0c396fce305929027c11fd53

openssl-devel-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 517b8ba885b5869b841fb55a68f00d35063a676b31eb935aeef7535a8de4585a

openssl-libs-1.1.1k-9.el8_6.i686.rpm

SHA-256: 960f4512af66f02d90460643923ceac9e18bf239c03ff4e665d6622e8784d1c1

openssl-libs-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 218b390ed038cf27278e6cd4c7c022be35339a4414a3094bc452eadf3e686048

openssl-libs-debuginfo-1.1.1k-9.el8_6.i686.rpm

SHA-256: 8052b333f7f0c02650299a0480c8ce9dc54c4a1124fd213866d8528568aec575

openssl-libs-debuginfo-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: d8f92911e8f69b64aaef2632631c285685542bf01b9c0ed4dac6e7d136be971d

openssl-perl-1.1.1k-9.el8_6.x86_64.rpm

SHA-256: 5b6b5ce24036dca17852e533068b3fa6a9574de9b3bc9abe251aabe28f061181

Related news

CVE-2023-45085: Releases - HyperCloud Docs

An issue exists in SoftIron HyperCloud where compute nodes may come online immediately without following the correct initialization process.  In this instance, workloads may be scheduled on these nodes and deploy to a failed or erroneous state, which impacts the availability of these workloads that may be deployed during this time window. This issue impacts HyperCloud versions from 2.0.0 to before 2.0.3.

Red Hat Security Advisory 2023-5103-01

Red Hat Security Advisory 2023-5103-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.11.6 images.

Red Hat Security Advisory 2023-4310-01

Red Hat Security Advisory 2023-4310-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.46. Issues addressed include denial of service and out of bounds read vulnerabilities.

RHSA-2023:4053: Red Hat Security Advisory: OpenShift Container Platform 4.11.45 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.45 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21235: A flaw was found in the VCS package, caused by improper validation of user-supplied input. By using a specially-crafted argument, a remote attacker could execute arbitrary commands o...

RHSA-2023:4128: Red Hat Security Advisory: edk2 security update

An update for edk2 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue ...

Red Hat Security Advisory 2023-3615-01

Red Hat Security Advisory 2023-3615-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.22. Issues addressed include a denial of service vulnerability.

CVE-2023-32463: DSA-2023-200: Security Update for Dell VxRail for Multiple Third-Party Component Vulnerabilities

Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.

CVE-2023-2673: VDE-2023-010 | CERT@VDE

Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions may allow UDP packets to bypass the filter rules and access the solely connected device behind the MGUARD which can be used for flooding attacks.

RHSA-2023:3420: Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.3 release and security update

An update is now available for Red Hat JBoss Web Server 5.7.3 on Red Hat Enterprise Linux versions 7, 8, and 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decry...

RHSA-2023:3421: Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.3 release and security update

Red Hat JBoss Web Server 5.7.3 zip release is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9, and Windows Server. Red Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be abl...

RHSA-2023:0584: Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.1 security update

Secondary Scheduler Operator for Red Hat OpenShift 1.1.1 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query ...

RHSA-2023:0584: Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.1 security update

Secondary Scheduler Operator for Red Hat OpenShift 1.1.1 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query ...

RHSA-2023:2932: Red Hat Security Advisory: edk2 security update

An update for edk2 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue affects all RSA padding mo...

RHSA-2023:2932: Red Hat Security Advisory: edk2 security update

An update for edk2 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue affects all RSA padding mo...

RHSA-2023:2932: Red Hat Security Advisory: edk2 security update

An update for edk2 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue affects all RSA padding mo...

Red Hat Security Advisory 2023-2165-01

Red Hat Security Advisory 2023-2165-01 - EDK is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. Issues addressed include double free, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-2165-01

Red Hat Security Advisory 2023-2165-01 - EDK is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. Issues addressed include double free, privilege escalation, and use-after-free vulnerabilities.

RHSA-2023:2165: Red Hat Security Advisory: edk2 security, bug fix, and enhancement update

An update for edk2 is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38578: A flaw was found in edk2. A integer underflow in the SmmEntryPoint function leads to a write into the SMM region allowing a local attacker with administration privileges on the system to execute code within the SMM privileged context. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability....

Red Hat Security Advisory 2023-2098-01

Red Hat Security Advisory 2023-2098-01 - Multicluster Engine for Kubernetes 2.0.8 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-2098-01

Red Hat Security Advisory 2023-2098-01 - Multicluster Engine for Kubernetes 2.0.8 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-2023-01

Red Hat Security Advisory 2023-2023-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.

Red Hat Security Advisory 2023-2023-01

Red Hat Security Advisory 2023-2023-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.

Red Hat Security Advisory 2023-1816-01

Red Hat Security Advisory 2023-1816-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.

Red Hat Security Advisory 2023-1816-01

Red Hat Security Advisory 2023-1816-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.

Red Hat Security Advisory 2023-1893-01

Red Hat Security Advisory 2023-1893-01 - Red Hat Multicluster Engine Hotfix Security Update for Console. Red Hat Product Security has rated this update as having a security impact of Critical.

RHSA-2023:1893: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.0 hotfix security update for console

Red Hat Multicluster Engine Hotfix Security Update for Console Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-29017: A flaw was found in vm2 where the component was not properly handling asynchronous errors. This flaw allows a remote, unauthenticated attacker to escape the restrictions of the sandbox and execute code on the host. * CVE-2023-29199: There exists a vulnerability in source code transformer (exception sanitization logic) of vm2 for versions up to 3.9.15, al...

RHSA-2023:1816: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.12.2 Bug Fix and security update

Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.12.2 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While ...

RHSA-2023:1816: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.12.2 Bug Fix and security update

Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.12.2 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While ...

RHSA-2023:1310: Red Hat Security Advisory: Logging Subsystem for Red Hat OpenShift - 5.5.9 security update

An update is now available for Logging Subsystem for Red Hat OpenShift - 5.5.9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large...

RHSA-2023:1405: Red Hat Security Advisory: openssl security update

An update for openssl is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue affects all RSA padding...

RHSA-2023:1405: Red Hat Security Advisory: openssl security update

An update for openssl is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue affects all RSA padding...

RHSA-2023:1405: Red Hat Security Advisory: openssl security update

An update for openssl is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue affects all RSA padding...

Red Hat Security Advisory 2023-1199-01

Red Hat Security Advisory 2023-1199-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include buffer overflow, double free, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-1199-01

Red Hat Security Advisory 2023-1199-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include buffer overflow, double free, and use-after-free vulnerabilities.

RHSA-2023:1199: Red Hat Security Advisory: openssl security and bug fix update

An update for openssl is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4203: A flaw was found in Open SSL. A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification, and requires either a CA to have signed the malicious certificate or for the application to continue certif...

RHSA-2023:0946: Red Hat Security Advisory: openssl security and bug fix update

An update for openssl is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4203: A flaw was found in Open SSL. A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification, and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite...

OpenSSL Fixes Multiple New Security Flaws with Latest Update

The OpenSSL Project has released fixes to address several security flaws, including a high-severity bug in the open source encryption toolkit that could potentially expose users to malicious attacks. Tracked as CVE-2023-0286, the issue relates to a case of type confusion that may permit an adversary to "read memory contents or enact a denial-of-service," the maintainers said in an advisory. The

GHSA-p52g-cm5j-mjv4: openssl-src subject to Timing Oracle in RSA Decryption

A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.

CVE-2023-0401

A NULL pointer can be dereferenced when signatures are being verified on PKCS7 signed or signedAndEnveloped data. In case the hash algorithm used for the signature is known to the OpenSSL library but the implementation of the hash algorithm is not available the digest initialization will fail. There is a missing check for the return value from the initialization function which later leads to invalid usage of the digest API most likely leading to a crash. The unavailability of an algorithm can be caused by using FIPS enabled configuration of providers or more commonly by not loading the legacy provider. PKCS7 data is processed by the SMIME library calls and also by the time stamp (TS) library calls. The TLS implementation in OpenSSL does not call these functions however third party applications would be affected if they call these functions to verify signatures on untrusted data.

CVE-2023-0401

A NULL pointer can be dereferenced when signatures are being verified on PKCS7 signed or signedAndEnveloped data. In case the hash algorithm used for the signature is known to the OpenSSL library but the implementation of the hash algorithm is not available the digest initialization will fail. There is a missing check for the return value from the initialization function which later leads to invalid usage of the digest API most likely leading to a crash. The unavailability of an algorithm can be caused by using FIPS enabled configuration of providers or more commonly by not loading the legacy provider. PKCS7 data is processed by the SMIME library calls and also by the time stamp (TS) library calls. The TLS implementation in OpenSSL does not call these functions however third party applications would be affected if they call these functions to verify signatures on untrusted data.