Headline
RHSA-2023:3408: Red Hat Security Advisory: openssl security update
An update for openssl is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP, and RSASVE.
- CVE-2022-4450: A double-free vulnerability was found in OpenSSL’s PEM_read_bio_ex function. The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the “name” (for example, “CERTIFICATE”), any header data, and the payload data. If the function succeeds, then the “name_out,” “header,” and “data” arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. Constructing a PEM file that results in 0 bytes of payload data is possible. In this case, PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a freed buffer. A double-free will occur if the caller also frees this buffer. This will most likely lead to a crash. This could be exploited by an attacker who can supply malicious PEM files for parsing to achieve a denial of service attack.
- CVE-2023-0215: A use-after-free vulnerability was found in OpenSSL’s BIO_new_NDEF function. The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally by OpenSSL to support the SMIME, CMS, and PKCS7 streaming capabilities, but it may also be called directly by end-user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions. For example, if a CMS recipient public key is invalid, the new filter BIO is freed, and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up, and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then calls BIO_pop() on the BIO, a use-after-free will occur, possibly resulting in a crash.
Synopsis
Moderate: openssl security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for openssl is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
- openssl: timing attack in RSA Decryption implementation (CVE-2022-4304)
- openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450)
- openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
Fixes
- BZ - 2164487 - CVE-2022-4304 openssl: timing attack in RSA Decryption implementation
- BZ - 2164492 - CVE-2023-0215 openssl: use-after-free following BIO_new_NDEF
- BZ - 2164494 - CVE-2022-4450 openssl: double free after calling PEM_read_bio_ex
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
openssl-1.1.1k-9.el8_6.src.rpm
SHA-256: 1304e95feab01cabe4f3140a5168f4e161daae4e1a65aab16de2c688cda85daf
x86_64
openssl-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 45af165fade232ce1dee1f40fa2a23f85d82bc8cee4f47fa25226bdd89b310cb
openssl-debuginfo-1.1.1k-9.el8_6.i686.rpm
SHA-256: b61441473f9581e3fcd73f5e63b3b216fd8280d7f37be7c435441d9eef82e112
openssl-debuginfo-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 6095fb89678f723fd3b6eac4c70aec620c0be35672d9987e54505742a411ae15
openssl-debugsource-1.1.1k-9.el8_6.i686.rpm
SHA-256: 6bdc601538c032bc2ffad0faef241bd42c2b5b78ff8aeb4ff19cbf2342483306
openssl-debugsource-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 19aef1d43ccc628d73edc3d173035c25d4a09985570cbff7006dac9ca1c85b2b
openssl-devel-1.1.1k-9.el8_6.i686.rpm
SHA-256: 14843be2fcaa07745c4a249c2c4c4622f6b07cfe0c396fce305929027c11fd53
openssl-devel-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 517b8ba885b5869b841fb55a68f00d35063a676b31eb935aeef7535a8de4585a
openssl-libs-1.1.1k-9.el8_6.i686.rpm
SHA-256: 960f4512af66f02d90460643923ceac9e18bf239c03ff4e665d6622e8784d1c1
openssl-libs-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 218b390ed038cf27278e6cd4c7c022be35339a4414a3094bc452eadf3e686048
openssl-libs-debuginfo-1.1.1k-9.el8_6.i686.rpm
SHA-256: 8052b333f7f0c02650299a0480c8ce9dc54c4a1124fd213866d8528568aec575
openssl-libs-debuginfo-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: d8f92911e8f69b64aaef2632631c285685542bf01b9c0ed4dac6e7d136be971d
openssl-perl-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 5b6b5ce24036dca17852e533068b3fa6a9574de9b3bc9abe251aabe28f061181
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
openssl-1.1.1k-9.el8_6.src.rpm
SHA-256: 1304e95feab01cabe4f3140a5168f4e161daae4e1a65aab16de2c688cda85daf
x86_64
openssl-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 45af165fade232ce1dee1f40fa2a23f85d82bc8cee4f47fa25226bdd89b310cb
openssl-debuginfo-1.1.1k-9.el8_6.i686.rpm
SHA-256: b61441473f9581e3fcd73f5e63b3b216fd8280d7f37be7c435441d9eef82e112
openssl-debuginfo-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 6095fb89678f723fd3b6eac4c70aec620c0be35672d9987e54505742a411ae15
openssl-debugsource-1.1.1k-9.el8_6.i686.rpm
SHA-256: 6bdc601538c032bc2ffad0faef241bd42c2b5b78ff8aeb4ff19cbf2342483306
openssl-debugsource-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 19aef1d43ccc628d73edc3d173035c25d4a09985570cbff7006dac9ca1c85b2b
openssl-devel-1.1.1k-9.el8_6.i686.rpm
SHA-256: 14843be2fcaa07745c4a249c2c4c4622f6b07cfe0c396fce305929027c11fd53
openssl-devel-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 517b8ba885b5869b841fb55a68f00d35063a676b31eb935aeef7535a8de4585a
openssl-libs-1.1.1k-9.el8_6.i686.rpm
SHA-256: 960f4512af66f02d90460643923ceac9e18bf239c03ff4e665d6622e8784d1c1
openssl-libs-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 218b390ed038cf27278e6cd4c7c022be35339a4414a3094bc452eadf3e686048
openssl-libs-debuginfo-1.1.1k-9.el8_6.i686.rpm
SHA-256: 8052b333f7f0c02650299a0480c8ce9dc54c4a1124fd213866d8528568aec575
openssl-libs-debuginfo-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: d8f92911e8f69b64aaef2632631c285685542bf01b9c0ed4dac6e7d136be971d
openssl-perl-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 5b6b5ce24036dca17852e533068b3fa6a9574de9b3bc9abe251aabe28f061181
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6
SRPM
openssl-1.1.1k-9.el8_6.src.rpm
SHA-256: 1304e95feab01cabe4f3140a5168f4e161daae4e1a65aab16de2c688cda85daf
s390x
openssl-1.1.1k-9.el8_6.s390x.rpm
SHA-256: 964774781a487d2e1953df2c360edc98389f50045390b8bf2833aa59eb05fb60
openssl-debuginfo-1.1.1k-9.el8_6.s390x.rpm
SHA-256: 2303f62e56e38197cd8c2a4c5b161a89418cbd04a42568028ba58ccfd0e8ba30
openssl-debugsource-1.1.1k-9.el8_6.s390x.rpm
SHA-256: be0359fd2e9001fd0bcf0d37e5b3fddd3c707cdc1626589529a180944f3c9760
openssl-devel-1.1.1k-9.el8_6.s390x.rpm
SHA-256: 2d8498edd06ae506f19bcf7e4273234d8f82cd785b95eb81664b36ac7d167fe4
openssl-libs-1.1.1k-9.el8_6.s390x.rpm
SHA-256: aa2b53c6296997658f8090a9b2b028fb77d6bacc7730e32f7a926b07d1b79ef8
openssl-libs-debuginfo-1.1.1k-9.el8_6.s390x.rpm
SHA-256: 515cd056d20ffafb5705dd4f82256366cd49b6cf0352f1ad635191ebafad64e2
openssl-perl-1.1.1k-9.el8_6.s390x.rpm
SHA-256: a628452c4e80b5473b94489ec592ab595c20914c79361282df5c2a18fe97c73a
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM
openssl-1.1.1k-9.el8_6.src.rpm
SHA-256: 1304e95feab01cabe4f3140a5168f4e161daae4e1a65aab16de2c688cda85daf
ppc64le
openssl-1.1.1k-9.el8_6.ppc64le.rpm
SHA-256: f52fbc17b87b279732f62a8c8c3a12410483926dc24e533d59c3dc1942ef359f
openssl-debuginfo-1.1.1k-9.el8_6.ppc64le.rpm
SHA-256: 7100ae33b73b182c5c834542c6c897e50f75a31aebf9ab60de403ce5276ccf68
openssl-debugsource-1.1.1k-9.el8_6.ppc64le.rpm
SHA-256: b55b3b57f8aac25352fdda50ecd73621037ddf3058a115b7a701a7132380b4f2
openssl-devel-1.1.1k-9.el8_6.ppc64le.rpm
SHA-256: d934db726df45deb814c70464501d987e4639ef9d7688305aeb4f885e96985ee
openssl-libs-1.1.1k-9.el8_6.ppc64le.rpm
SHA-256: 4b1bce7c435fb1535fd3289a583d00787db9a9c090d4e0ac49168d55c21ec295
openssl-libs-debuginfo-1.1.1k-9.el8_6.ppc64le.rpm
SHA-256: c8fa6cb0745c789d1783ae6326c3aa8de88f6f1b1600f711acf2ba8a4121166d
openssl-perl-1.1.1k-9.el8_6.ppc64le.rpm
SHA-256: ef5bb72af300b45d8bf232d60c6944dc11dd7f09836abe5d510777f32a3344ab
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
openssl-1.1.1k-9.el8_6.src.rpm
SHA-256: 1304e95feab01cabe4f3140a5168f4e161daae4e1a65aab16de2c688cda85daf
x86_64
openssl-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 45af165fade232ce1dee1f40fa2a23f85d82bc8cee4f47fa25226bdd89b310cb
openssl-debuginfo-1.1.1k-9.el8_6.i686.rpm
SHA-256: b61441473f9581e3fcd73f5e63b3b216fd8280d7f37be7c435441d9eef82e112
openssl-debuginfo-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 6095fb89678f723fd3b6eac4c70aec620c0be35672d9987e54505742a411ae15
openssl-debugsource-1.1.1k-9.el8_6.i686.rpm
SHA-256: 6bdc601538c032bc2ffad0faef241bd42c2b5b78ff8aeb4ff19cbf2342483306
openssl-debugsource-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 19aef1d43ccc628d73edc3d173035c25d4a09985570cbff7006dac9ca1c85b2b
openssl-devel-1.1.1k-9.el8_6.i686.rpm
SHA-256: 14843be2fcaa07745c4a249c2c4c4622f6b07cfe0c396fce305929027c11fd53
openssl-devel-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 517b8ba885b5869b841fb55a68f00d35063a676b31eb935aeef7535a8de4585a
openssl-libs-1.1.1k-9.el8_6.i686.rpm
SHA-256: 960f4512af66f02d90460643923ceac9e18bf239c03ff4e665d6622e8784d1c1
openssl-libs-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 218b390ed038cf27278e6cd4c7c022be35339a4414a3094bc452eadf3e686048
openssl-libs-debuginfo-1.1.1k-9.el8_6.i686.rpm
SHA-256: 8052b333f7f0c02650299a0480c8ce9dc54c4a1124fd213866d8528568aec575
openssl-libs-debuginfo-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: d8f92911e8f69b64aaef2632631c285685542bf01b9c0ed4dac6e7d136be971d
openssl-perl-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 5b6b5ce24036dca17852e533068b3fa6a9574de9b3bc9abe251aabe28f061181
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6
SRPM
openssl-1.1.1k-9.el8_6.src.rpm
SHA-256: 1304e95feab01cabe4f3140a5168f4e161daae4e1a65aab16de2c688cda85daf
aarch64
openssl-1.1.1k-9.el8_6.aarch64.rpm
SHA-256: 698e69c97e3d74fa3079ef1d5718700d6d4e23402565242fa93cd14da9bc5117
openssl-debuginfo-1.1.1k-9.el8_6.aarch64.rpm
SHA-256: 4bef6bbc84ca8cb557aa287127a6f087e4145d01388002f45bf1ebd6366a86b6
openssl-debugsource-1.1.1k-9.el8_6.aarch64.rpm
SHA-256: e18f0725309e8b4a11dcc2e915e65bc45d357909108bb5797833b323e8f251c6
openssl-devel-1.1.1k-9.el8_6.aarch64.rpm
SHA-256: 7fbf3c89e670aa1565c28bc73bdb2fc328727896a49f47a257365d9bb479ef87
openssl-libs-1.1.1k-9.el8_6.aarch64.rpm
SHA-256: 81ad26f1ce613e3670e009a275623403c00b3ca416a15c7ddfc82a5545e75de9
openssl-libs-debuginfo-1.1.1k-9.el8_6.aarch64.rpm
SHA-256: a817e2005d34a6b1104d4a2c4aeaff0011cff49969b5b096d624812ce8ab33b6
openssl-perl-1.1.1k-9.el8_6.aarch64.rpm
SHA-256: 011a7c0e868c99488c3da1d7df0614c7352ec83cb10416b420206fd1b8e24f5f
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM
openssl-1.1.1k-9.el8_6.src.rpm
SHA-256: 1304e95feab01cabe4f3140a5168f4e161daae4e1a65aab16de2c688cda85daf
ppc64le
openssl-1.1.1k-9.el8_6.ppc64le.rpm
SHA-256: f52fbc17b87b279732f62a8c8c3a12410483926dc24e533d59c3dc1942ef359f
openssl-debuginfo-1.1.1k-9.el8_6.ppc64le.rpm
SHA-256: 7100ae33b73b182c5c834542c6c897e50f75a31aebf9ab60de403ce5276ccf68
openssl-debugsource-1.1.1k-9.el8_6.ppc64le.rpm
SHA-256: b55b3b57f8aac25352fdda50ecd73621037ddf3058a115b7a701a7132380b4f2
openssl-devel-1.1.1k-9.el8_6.ppc64le.rpm
SHA-256: d934db726df45deb814c70464501d987e4639ef9d7688305aeb4f885e96985ee
openssl-libs-1.1.1k-9.el8_6.ppc64le.rpm
SHA-256: 4b1bce7c435fb1535fd3289a583d00787db9a9c090d4e0ac49168d55c21ec295
openssl-libs-debuginfo-1.1.1k-9.el8_6.ppc64le.rpm
SHA-256: c8fa6cb0745c789d1783ae6326c3aa8de88f6f1b1600f711acf2ba8a4121166d
openssl-perl-1.1.1k-9.el8_6.ppc64le.rpm
SHA-256: ef5bb72af300b45d8bf232d60c6944dc11dd7f09836abe5d510777f32a3344ab
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM
openssl-1.1.1k-9.el8_6.src.rpm
SHA-256: 1304e95feab01cabe4f3140a5168f4e161daae4e1a65aab16de2c688cda85daf
x86_64
openssl-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 45af165fade232ce1dee1f40fa2a23f85d82bc8cee4f47fa25226bdd89b310cb
openssl-debuginfo-1.1.1k-9.el8_6.i686.rpm
SHA-256: b61441473f9581e3fcd73f5e63b3b216fd8280d7f37be7c435441d9eef82e112
openssl-debuginfo-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 6095fb89678f723fd3b6eac4c70aec620c0be35672d9987e54505742a411ae15
openssl-debugsource-1.1.1k-9.el8_6.i686.rpm
SHA-256: 6bdc601538c032bc2ffad0faef241bd42c2b5b78ff8aeb4ff19cbf2342483306
openssl-debugsource-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 19aef1d43ccc628d73edc3d173035c25d4a09985570cbff7006dac9ca1c85b2b
openssl-devel-1.1.1k-9.el8_6.i686.rpm
SHA-256: 14843be2fcaa07745c4a249c2c4c4622f6b07cfe0c396fce305929027c11fd53
openssl-devel-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 517b8ba885b5869b841fb55a68f00d35063a676b31eb935aeef7535a8de4585a
openssl-libs-1.1.1k-9.el8_6.i686.rpm
SHA-256: 960f4512af66f02d90460643923ceac9e18bf239c03ff4e665d6622e8784d1c1
openssl-libs-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 218b390ed038cf27278e6cd4c7c022be35339a4414a3094bc452eadf3e686048
openssl-libs-debuginfo-1.1.1k-9.el8_6.i686.rpm
SHA-256: 8052b333f7f0c02650299a0480c8ce9dc54c4a1124fd213866d8528568aec575
openssl-libs-debuginfo-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: d8f92911e8f69b64aaef2632631c285685542bf01b9c0ed4dac6e7d136be971d
openssl-perl-1.1.1k-9.el8_6.x86_64.rpm
SHA-256: 5b6b5ce24036dca17852e533068b3fa6a9574de9b3bc9abe251aabe28f061181
Related news
An issue exists in SoftIron HyperCloud where compute nodes may come online immediately without following the correct initialization process. In this instance, workloads may be scheduled on these nodes and deploy to a failed or erroneous state, which impacts the availability of these workloads that may be deployed during this time window. This issue impacts HyperCloud versions from 2.0.0 to before 2.0.3.
Red Hat Security Advisory 2023-5103-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.11.6 images.
Red Hat Security Advisory 2023-4310-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.46. Issues addressed include denial of service and out of bounds read vulnerabilities.
Red Hat OpenShift Container Platform release 4.11.45 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21235: A flaw was found in the VCS package, caused by improper validation of user-supplied input. By using a specially-crafted argument, a remote attacker could execute arbitrary commands o...
An update for edk2 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue ...
Red Hat Security Advisory 2023-3615-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.22. Issues addressed include a denial of service vulnerability.
Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.
Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions may allow UDP packets to bypass the filter rules and access the solely connected device behind the MGUARD which can be used for flooding attacks.
An update is now available for Red Hat JBoss Web Server 5.7.3 on Red Hat Enterprise Linux versions 7, 8, and 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decry...
Red Hat JBoss Web Server 5.7.3 zip release is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9, and Windows Server. Red Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be abl...
Secondary Scheduler Operator for Red Hat OpenShift 1.1.1 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query ...
Secondary Scheduler Operator for Red Hat OpenShift 1.1.1 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query ...
An update for edk2 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue affects all RSA padding mo...
An update for edk2 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue affects all RSA padding mo...
An update for edk2 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue affects all RSA padding mo...
Red Hat Security Advisory 2023-2165-01 - EDK is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. Issues addressed include double free, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-2165-01 - EDK is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. Issues addressed include double free, privilege escalation, and use-after-free vulnerabilities.
An update for edk2 is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38578: A flaw was found in edk2. A integer underflow in the SmmEntryPoint function leads to a write into the SMM region allowing a local attacker with administration privileges on the system to execute code within the SMM privileged context. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability....
Red Hat Security Advisory 2023-2098-01 - Multicluster Engine for Kubernetes 2.0.8 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-2098-01 - Multicluster Engine for Kubernetes 2.0.8 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-2023-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.
Red Hat Security Advisory 2023-2023-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.
Red Hat Security Advisory 2023-1816-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.
Red Hat Security Advisory 2023-1816-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.
Red Hat Security Advisory 2023-1893-01 - Red Hat Multicluster Engine Hotfix Security Update for Console. Red Hat Product Security has rated this update as having a security impact of Critical.
Red Hat Multicluster Engine Hotfix Security Update for Console Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-29017: A flaw was found in vm2 where the component was not properly handling asynchronous errors. This flaw allows a remote, unauthenticated attacker to escape the restrictions of the sandbox and execute code on the host. * CVE-2023-29199: There exists a vulnerability in source code transformer (exception sanitization logic) of vm2 for versions up to 3.9.15, al...
Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.12.2 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While ...
Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.12.2 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While ...
An update is now available for Logging Subsystem for Red Hat OpenShift - 5.5.9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large...
An update for openssl is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue affects all RSA padding...
An update for openssl is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue affects all RSA padding...
An update for openssl is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue affects all RSA padding...
Red Hat Security Advisory 2023-1199-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include buffer overflow, double free, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-1199-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include buffer overflow, double free, and use-after-free vulnerabilities.
An update for openssl is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4203: A flaw was found in Open SSL. A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification, and requires either a CA to have signed the malicious certificate or for the application to continue certif...
An update for openssl is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4203: A flaw was found in Open SSL. A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification, and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite...
The OpenSSL Project has released fixes to address several security flaws, including a high-severity bug in the open source encryption toolkit that could potentially expose users to malicious attacks. Tracked as CVE-2023-0286, the issue relates to a case of type confusion that may permit an adversary to "read memory contents or enact a denial-of-service," the maintainers said in an advisory. The
A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.
A NULL pointer can be dereferenced when signatures are being verified on PKCS7 signed or signedAndEnveloped data. In case the hash algorithm used for the signature is known to the OpenSSL library but the implementation of the hash algorithm is not available the digest initialization will fail. There is a missing check for the return value from the initialization function which later leads to invalid usage of the digest API most likely leading to a crash. The unavailability of an algorithm can be caused by using FIPS enabled configuration of providers or more commonly by not loading the legacy provider. PKCS7 data is processed by the SMIME library calls and also by the time stamp (TS) library calls. The TLS implementation in OpenSSL does not call these functions however third party applications would be affected if they call these functions to verify signatures on untrusted data.
A NULL pointer can be dereferenced when signatures are being verified on PKCS7 signed or signedAndEnveloped data. In case the hash algorithm used for the signature is known to the OpenSSL library but the implementation of the hash algorithm is not available the digest initialization will fail. There is a missing check for the return value from the initialization function which later leads to invalid usage of the digest API most likely leading to a crash. The unavailability of an algorithm can be caused by using FIPS enabled configuration of providers or more commonly by not loading the legacy provider. PKCS7 data is processed by the SMIME library calls and also by the time stamp (TS) library calls. The TLS implementation in OpenSSL does not call these functions however third party applications would be affected if they call these functions to verify signatures on untrusted data.