Headline
RHSA-2023:1441: Red Hat Security Advisory: openssl security update
An update for openssl is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2023-0286: A type confusion vulnerability was found in OpenSSL when OpenSSL X.400 addresses processing inside an X.509 GeneralName. When CRL checking is enabled (for example, the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or cause a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, of which neither needs a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. In this case, this vulnerability is likely only to affect applications that have implemented their own functionality for retrieving CRLs over a network.
Synopsis
Important: openssl security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for openssl is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
- openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
Fixes
- BZ - 2164440 - CVE-2023-0286 openssl: X.400 address type confusion in X.509 GeneralName
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
openssl-1.1.1k-8.el8_6.src.rpm
SHA-256: 04bad14aa2ccbf517ebd0910c1c9fb3a3880348f85a76de3d07a88e47e10e0b5
x86_64
openssl-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: 43839bef322acbeca3809992da6b5d805e988c11ef6187e9c519df075f76c2f2
openssl-debuginfo-1.1.1k-8.el8_6.i686.rpm
SHA-256: ff0be0edf5a5343eda85afc2284dbb7775b8be7b01eadfca16bbbcffb85a84a6
openssl-debuginfo-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: 02e59372c6f928f2865d3819527a0bb3b39079a0824ee5983b1b870077a0a893
openssl-debugsource-1.1.1k-8.el8_6.i686.rpm
SHA-256: 5238795450198e0be3ed6a8fd92170980a2ea5592933c57bd9afa9cfc59dba55
openssl-debugsource-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: bf8d4671c50816cdfe1fb2994711056193cf4978452a58ad816c5b448666999f
openssl-devel-1.1.1k-8.el8_6.i686.rpm
SHA-256: d8421774421fb853e87a7f6cd828af1e6642b94817c69e161a413ed1a0db5fab
openssl-devel-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: b642c3d094128bd2129fb77b92123717605abda580f43799b121572df3571a32
openssl-libs-1.1.1k-8.el8_6.i686.rpm
SHA-256: 19ecb0b3e7fd7c4b5564988a8a04d50f954aee7d366f88907346e8dc5d572e70
openssl-libs-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: f92619ffcb30ece3826bb9d4ddb4da20d34755306bae0f218571922e51eacbd5
openssl-libs-debuginfo-1.1.1k-8.el8_6.i686.rpm
SHA-256: 0829d135e57d88eaa7732f4f00464a27f2589049442c2a952d0e8b5a818fc599
openssl-libs-debuginfo-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: 3b72ccb227f306c27f6560280e3f50452bdeef44238b27ac5ebeaefdcc3a9600
openssl-perl-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: 50b1d9cd52bbb6cc499f988ae6854b5da53bbb640bf0e83af201fa67ab1daaf1
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
openssl-1.1.1k-8.el8_6.src.rpm
SHA-256: 04bad14aa2ccbf517ebd0910c1c9fb3a3880348f85a76de3d07a88e47e10e0b5
x86_64
openssl-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: 43839bef322acbeca3809992da6b5d805e988c11ef6187e9c519df075f76c2f2
openssl-debuginfo-1.1.1k-8.el8_6.i686.rpm
SHA-256: ff0be0edf5a5343eda85afc2284dbb7775b8be7b01eadfca16bbbcffb85a84a6
openssl-debuginfo-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: 02e59372c6f928f2865d3819527a0bb3b39079a0824ee5983b1b870077a0a893
openssl-debugsource-1.1.1k-8.el8_6.i686.rpm
SHA-256: 5238795450198e0be3ed6a8fd92170980a2ea5592933c57bd9afa9cfc59dba55
openssl-debugsource-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: bf8d4671c50816cdfe1fb2994711056193cf4978452a58ad816c5b448666999f
openssl-devel-1.1.1k-8.el8_6.i686.rpm
SHA-256: d8421774421fb853e87a7f6cd828af1e6642b94817c69e161a413ed1a0db5fab
openssl-devel-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: b642c3d094128bd2129fb77b92123717605abda580f43799b121572df3571a32
openssl-libs-1.1.1k-8.el8_6.i686.rpm
SHA-256: 19ecb0b3e7fd7c4b5564988a8a04d50f954aee7d366f88907346e8dc5d572e70
openssl-libs-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: f92619ffcb30ece3826bb9d4ddb4da20d34755306bae0f218571922e51eacbd5
openssl-libs-debuginfo-1.1.1k-8.el8_6.i686.rpm
SHA-256: 0829d135e57d88eaa7732f4f00464a27f2589049442c2a952d0e8b5a818fc599
openssl-libs-debuginfo-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: 3b72ccb227f306c27f6560280e3f50452bdeef44238b27ac5ebeaefdcc3a9600
openssl-perl-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: 50b1d9cd52bbb6cc499f988ae6854b5da53bbb640bf0e83af201fa67ab1daaf1
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6
SRPM
openssl-1.1.1k-8.el8_6.src.rpm
SHA-256: 04bad14aa2ccbf517ebd0910c1c9fb3a3880348f85a76de3d07a88e47e10e0b5
s390x
openssl-1.1.1k-8.el8_6.s390x.rpm
SHA-256: 6a9ed284940ab10b79fd46245baf089d88254b4ffcfa1693e9c0fd72e470eb34
openssl-debuginfo-1.1.1k-8.el8_6.s390x.rpm
SHA-256: 96e9cfe7648bdd50655b8ad1ffe736a1bd30c84ccaae7b7e3efa858143cf0355
openssl-debugsource-1.1.1k-8.el8_6.s390x.rpm
SHA-256: c0326f7a4800cb8162fe68b4e1e24fc6466612cac45bc444575408df9ea875e4
openssl-devel-1.1.1k-8.el8_6.s390x.rpm
SHA-256: ba2adc58b63e1e34b1754b02b265f44993086dcba79a277adb853a55d66d600f
openssl-libs-1.1.1k-8.el8_6.s390x.rpm
SHA-256: a6c63706666e37b175f43d6fa601bc84e0da1a0647ef08954a8bde2a59de7bcc
openssl-libs-debuginfo-1.1.1k-8.el8_6.s390x.rpm
SHA-256: 125d8928d74baa23a6e03b6c2d19a1ab806d8b46dea039429dc9252423ca04cc
openssl-perl-1.1.1k-8.el8_6.s390x.rpm
SHA-256: 72ed1965bde99f781163e7360b3cb181a28fe93c7bc5643f7f41261ec289c223
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM
openssl-1.1.1k-8.el8_6.src.rpm
SHA-256: 04bad14aa2ccbf517ebd0910c1c9fb3a3880348f85a76de3d07a88e47e10e0b5
ppc64le
openssl-1.1.1k-8.el8_6.ppc64le.rpm
SHA-256: 1472f5d622d87a87ee4c14e3a2509284a813c5979abc280910d28aa71fd855e9
openssl-debuginfo-1.1.1k-8.el8_6.ppc64le.rpm
SHA-256: 69bda0460d4391888e41b0fa444cd7a8753d0c497eeec506098dd9f29360fa19
openssl-debugsource-1.1.1k-8.el8_6.ppc64le.rpm
SHA-256: fee5af70e02987c2582420c230e5a25fead211c217efe74ed7ed76494a23a508
openssl-devel-1.1.1k-8.el8_6.ppc64le.rpm
SHA-256: 290050e6f713b425f84cbd915eb06fb134af905b3ea399c2f75c81326a695a05
openssl-libs-1.1.1k-8.el8_6.ppc64le.rpm
SHA-256: 1ee5544d9dcecea204b3b2fa659f5d714b0835bbf0cb25d014e1c781fe4b02a0
openssl-libs-debuginfo-1.1.1k-8.el8_6.ppc64le.rpm
SHA-256: ec0f0103302ac7c5e313067ab2d5e0832974481f13d7940d443fad0c92c91a9c
openssl-perl-1.1.1k-8.el8_6.ppc64le.rpm
SHA-256: 1343f3ba285e5faa942aff02a5e68adcf967b4ac434b9a31b6b7e3cf199d23c4
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
openssl-1.1.1k-8.el8_6.src.rpm
SHA-256: 04bad14aa2ccbf517ebd0910c1c9fb3a3880348f85a76de3d07a88e47e10e0b5
x86_64
openssl-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: 43839bef322acbeca3809992da6b5d805e988c11ef6187e9c519df075f76c2f2
openssl-debuginfo-1.1.1k-8.el8_6.i686.rpm
SHA-256: ff0be0edf5a5343eda85afc2284dbb7775b8be7b01eadfca16bbbcffb85a84a6
openssl-debuginfo-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: 02e59372c6f928f2865d3819527a0bb3b39079a0824ee5983b1b870077a0a893
openssl-debugsource-1.1.1k-8.el8_6.i686.rpm
SHA-256: 5238795450198e0be3ed6a8fd92170980a2ea5592933c57bd9afa9cfc59dba55
openssl-debugsource-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: bf8d4671c50816cdfe1fb2994711056193cf4978452a58ad816c5b448666999f
openssl-devel-1.1.1k-8.el8_6.i686.rpm
SHA-256: d8421774421fb853e87a7f6cd828af1e6642b94817c69e161a413ed1a0db5fab
openssl-devel-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: b642c3d094128bd2129fb77b92123717605abda580f43799b121572df3571a32
openssl-libs-1.1.1k-8.el8_6.i686.rpm
SHA-256: 19ecb0b3e7fd7c4b5564988a8a04d50f954aee7d366f88907346e8dc5d572e70
openssl-libs-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: f92619ffcb30ece3826bb9d4ddb4da20d34755306bae0f218571922e51eacbd5
openssl-libs-debuginfo-1.1.1k-8.el8_6.i686.rpm
SHA-256: 0829d135e57d88eaa7732f4f00464a27f2589049442c2a952d0e8b5a818fc599
openssl-libs-debuginfo-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: 3b72ccb227f306c27f6560280e3f50452bdeef44238b27ac5ebeaefdcc3a9600
openssl-perl-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: 50b1d9cd52bbb6cc499f988ae6854b5da53bbb640bf0e83af201fa67ab1daaf1
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6
SRPM
openssl-1.1.1k-8.el8_6.src.rpm
SHA-256: 04bad14aa2ccbf517ebd0910c1c9fb3a3880348f85a76de3d07a88e47e10e0b5
aarch64
openssl-1.1.1k-8.el8_6.aarch64.rpm
SHA-256: a617bd3c655bf2b0702190e65a0b48e1f78e829b98bc13dbcab4c11ca260b809
openssl-debuginfo-1.1.1k-8.el8_6.aarch64.rpm
SHA-256: f84816e2261500f49c1e1462e2e4e7e3ec5d3a45442cf51d0161e41b4b54c716
openssl-debugsource-1.1.1k-8.el8_6.aarch64.rpm
SHA-256: 2fcf3f01707ee3e6068e4a5df37d799efc197f0d339d77b351c56ff08db43a7f
openssl-devel-1.1.1k-8.el8_6.aarch64.rpm
SHA-256: 41a795bca1e9c4108dfdca1b94ec7c4f0b5081be75a6101bcf4159d87d289b1a
openssl-libs-1.1.1k-8.el8_6.aarch64.rpm
SHA-256: 11714597ada8c8eee3cdd722d351825c1a39e49f4493912d82358c8a8eb83d2f
openssl-libs-debuginfo-1.1.1k-8.el8_6.aarch64.rpm
SHA-256: d6af1624e836c09ddc13e357589ed5e896be44314c1a120d5be9a7819ba7395e
openssl-perl-1.1.1k-8.el8_6.aarch64.rpm
SHA-256: 14f1503f7154c2a7b3522cc6c5d8ebba53bf1803a7c7b06ab828199dfbee1a55
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM
openssl-1.1.1k-8.el8_6.src.rpm
SHA-256: 04bad14aa2ccbf517ebd0910c1c9fb3a3880348f85a76de3d07a88e47e10e0b5
ppc64le
openssl-1.1.1k-8.el8_6.ppc64le.rpm
SHA-256: 1472f5d622d87a87ee4c14e3a2509284a813c5979abc280910d28aa71fd855e9
openssl-debuginfo-1.1.1k-8.el8_6.ppc64le.rpm
SHA-256: 69bda0460d4391888e41b0fa444cd7a8753d0c497eeec506098dd9f29360fa19
openssl-debugsource-1.1.1k-8.el8_6.ppc64le.rpm
SHA-256: fee5af70e02987c2582420c230e5a25fead211c217efe74ed7ed76494a23a508
openssl-devel-1.1.1k-8.el8_6.ppc64le.rpm
SHA-256: 290050e6f713b425f84cbd915eb06fb134af905b3ea399c2f75c81326a695a05
openssl-libs-1.1.1k-8.el8_6.ppc64le.rpm
SHA-256: 1ee5544d9dcecea204b3b2fa659f5d714b0835bbf0cb25d014e1c781fe4b02a0
openssl-libs-debuginfo-1.1.1k-8.el8_6.ppc64le.rpm
SHA-256: ec0f0103302ac7c5e313067ab2d5e0832974481f13d7940d443fad0c92c91a9c
openssl-perl-1.1.1k-8.el8_6.ppc64le.rpm
SHA-256: 1343f3ba285e5faa942aff02a5e68adcf967b4ac434b9a31b6b7e3cf199d23c4
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM
openssl-1.1.1k-8.el8_6.src.rpm
SHA-256: 04bad14aa2ccbf517ebd0910c1c9fb3a3880348f85a76de3d07a88e47e10e0b5
x86_64
openssl-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: 43839bef322acbeca3809992da6b5d805e988c11ef6187e9c519df075f76c2f2
openssl-debuginfo-1.1.1k-8.el8_6.i686.rpm
SHA-256: ff0be0edf5a5343eda85afc2284dbb7775b8be7b01eadfca16bbbcffb85a84a6
openssl-debuginfo-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: 02e59372c6f928f2865d3819527a0bb3b39079a0824ee5983b1b870077a0a893
openssl-debugsource-1.1.1k-8.el8_6.i686.rpm
SHA-256: 5238795450198e0be3ed6a8fd92170980a2ea5592933c57bd9afa9cfc59dba55
openssl-debugsource-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: bf8d4671c50816cdfe1fb2994711056193cf4978452a58ad816c5b448666999f
openssl-devel-1.1.1k-8.el8_6.i686.rpm
SHA-256: d8421774421fb853e87a7f6cd828af1e6642b94817c69e161a413ed1a0db5fab
openssl-devel-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: b642c3d094128bd2129fb77b92123717605abda580f43799b121572df3571a32
openssl-libs-1.1.1k-8.el8_6.i686.rpm
SHA-256: 19ecb0b3e7fd7c4b5564988a8a04d50f954aee7d366f88907346e8dc5d572e70
openssl-libs-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: f92619ffcb30ece3826bb9d4ddb4da20d34755306bae0f218571922e51eacbd5
openssl-libs-debuginfo-1.1.1k-8.el8_6.i686.rpm
SHA-256: 0829d135e57d88eaa7732f4f00464a27f2589049442c2a952d0e8b5a818fc599
openssl-libs-debuginfo-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: 3b72ccb227f306c27f6560280e3f50452bdeef44238b27ac5ebeaefdcc3a9600
openssl-perl-1.1.1k-8.el8_6.x86_64.rpm
SHA-256: 50b1d9cd52bbb6cc499f988ae6854b5da53bbb640bf0e83af201fa67ab1daaf1
Related news
Gentoo Linux Security Advisory 202402-8 - Multiple vulnerabilities have been found in OpenSSL, the worst of which could result in denial of service. Versions greater than or equal to 3.0.10 are affected.
Improper encoding or escaping of output in Wing FTP Server (User Web Client) allows Cross-Site Scripting (XSS).This issue affects Wing FTP Server: <= 7.2.0.
An update for edk2 is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0286: A type confusion vulnerability was found in OpenSSL when OpenSSL X.400 addresses processing inside an X.509 GeneralName. When CRL checking is enabled (for example, the applicat...
An update for edk2 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue ...
Red Hat Security Advisory 2023-3624-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.
Previous versions of HP Device Manager (prior to HPDM 5.0.10) could potentially allow command injection and/or elevation of privileges.
An update is now available for Red Hat JBoss Core Services Apache HTTP Server 2.4.51 Service Pack 2 on Red Hat Enterprise Linux versions 7 and 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2006-20001: A flaw was found in the mod_dav module of httpd. A specially crafted "If:" request header can cause a memory read or write of a single zero byte due to a missing error check, resulting in a Denial of Service. * CVE-2022-4304: A timing-based side channel exists in the Open...
Secondary Scheduler Operator for Red Hat OpenShift 1.1.1 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query ...
Red Hat Security Advisory 2023-2110-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.16. Issues addressed include a bypass vulnerability.
An update for edk2 is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38578: A flaw was found in edk2. A integer underflow in the SmmEntryPoint function leads to a write into the SMM region allowing a local attacker with administration privileges on the system to execute code within the SMM privileged context. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability....
The Migration Toolkit for Containers (MTC) 1.7.9 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by...
Multicluster Engine for Kubernetes 2.0.8 General Availability release images, which fix bugs and security updates container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25881: A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server.
Multicluster Engine for Kubernetes 2.1.6 General Availability release images, which fix bugs and security updates container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25881: A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server.
Red Hat Security Advisory 2023-1887-01 - Multicluster Engine for Kubernetes 2.2.3 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a denial of service vulnerability.
An update for edk2 is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0286: A type confusion vulnerability was found in OpenSSL when OpenSSL X.400 addresses processing inside an X.509 GeneralName. When CRL checking is enabled (for example, the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read...
Red Hat Security Advisory 2023-1888-01 - Red Hat Advanced Cluster Management for Kubernetes 2.7.3 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include denial of service and server-side request forgery vulnerabilities.
Red Hat Advanced Cluster Management for Kubernetes 2.7.3 General Availability release images, which fix bugs and security updates container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3841: A Server-Side Request Forgery (SSRF) vulnerability was found in the console API endpoint from Red Hat Advanced Cluster Management for Kubernetes (RHACM). An attacker could take advantage of this as the console API endpoint is missing an authentication check, allowing unauth...
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through...
Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.12.2 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While ...
Red Hat OpenShift Container Platform release 4.9.59 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-20329: A flaw was found in Mongo. Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshaling Go objects into BSON. This flaw allows a malicious user to use a Go object with a specific string to inject additional fields into marshaled documen...
Red Hat Security Advisory 2023-1310-01 - An update is now available for Logging Subsystem for Red Hat OpenShift - 5.5.9. Red Hat Product Security has rated this update as having a security impact of Moderate.
Red Hat Security Advisory 2023-1440-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library.
Red Hat Security Advisory 2023-1441-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library.
An update for openssl is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0286: A type confusion vulnerability was found in OpenSSL when OpenSSL X.400 addresses processing inside an X.509 GeneralName. When CRL checking is enabled (for example, the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to r...
An update for openssl is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0286: A type confusion vulnerability was found in OpenSSL when OpenSSL X.400 addresses processing inside an X.509 GeneralName. When CRL checking is enabled (for example, the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling...
An update for openssl is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4304: A timing-based side channel exists in the OpenSSL RSA Decryption implementation, which could be sufficient to recover a ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption, an attacker would have to be able to send a very large number of trial messages for decryption. This issue affects all RSA padding...
Red Hat Security Advisory 2023-1335-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library.
An update for openssl is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0286: A type confusion vulnerability was found in OpenSSL when OpenSSL X.400 addresses processing inside an X.509 GeneralName. When CRL checking is enabled (for example, the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or cau...
Red Hat Security Advisory 2023-1199-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include buffer overflow, double free, and use-after-free vulnerabilities.
An update for openssl is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4203: A flaw was found in Open SSL. A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification, and requires either a CA to have signed the malicious certificate or for the application to continue certif...
An update for openssl is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4203: A flaw was found in Open SSL. A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification, and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite...
Your fortnightly rundown of AppSec vulnerabilities, new hacking techniques, and other cybersecurity news
pyca/cryptography's wheels include a statically linked copy of OpenSSL. The versions of OpenSSL included in cryptography 0.8.1-39.0.0 are vulnerable to a security issue. More details about the vulnerabilities themselves can be found in https://www.openssl.org/news/secadv/20221213.txt and https://www.openssl.org/news/secadv/20230207.txt. If you are building cryptography source ("sdist") then you are responsible for upgrading your copy of OpenSSL. Only users installing from wheels built by the cryptography project (i.e., those distributed on PyPI) need to update their cryptography versions.
A NULL pointer can be dereferenced when signatures are being verified on PKCS7 signed or signedAndEnveloped data. In case the hash algorithm used for the signature is known to the OpenSSL library but the implementation of the hash algorithm is not available the digest initialization will fail. There is a missing check for the return value from the initialization function which later leads to invalid usage of the digest API most likely leading to a crash. The unavailability of an algorithm can be caused by using FIPS enabled configuration of providers or more commonly by not loading the legacy provider. PKCS7 data is processed by the SMIME library calls and also by the time stamp (TS) library calls. The TLS implementation in OpenSSL does not call these functions however third party applications would be affected if they call these functions to verify signatures on untrusted data.
Ubuntu Security Notice 5845-2 - USN-5845-1 fixed several vulnerabilities in OpenSSL. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. David Benjamin discovered that OpenSSL incorrectly handled X.400 address processing. A remote attacker could possibly use this issue to read arbitrary memory contents or cause OpenSSL to crash, resulting in a denial of service.