- Issued:
- 2023-06-21
- Updated:
- 2023-06-21
RHSA-2023:3722 - Moderate: openssl security and bug fix update
Synopsis
Moderate: openssl security and bug fix update
Type/Severity
Security Advisory Moderate
Topic
An update for openssl is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
-
openssl: Possible DoS translating ASN.1 object identifiers (CVE-2023-2650)
-
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints (CVE-2023-0464)
-
openssl: Invalid certificate policies in leaf certificates are silently ignored (CVE-2023-0465)
-
openssl: Certificate policy check not enabled (CVE-2023-0466)
-
openssl: Input buffer over-read in AES-XTS implementation on 64 bit ARM (CVE-2023-1255)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
In FIPS mode, openssl KDFs should only allow selected hash algorithms (BZ#2175860)
-
In FIPS mode, openssl should reject short KDF input or output keys or provide an indicator (BZ#2175864)
-
In FIPS mode, openssl should provide an indicator for AES-GCM to query whether the IV was generated internally or provided externally (BZ#2175868)
-
openssl FIPS mode self-test should zeroize
outinverify_integrityin providers/fips/self_test.c (BZ#2175873) -
In FIPS mode, openssl should not support RSA encryption or decryption without padding (outside of RSASVE) or provide an indicator (BZ#2178029)
-
In FIPS mode, openssl should reject EVP_PKEY_fromdata() for short DHX keys, or provide an indicator (BZ#2178030)
-
In FIPS mode, openssl should not use the legacy ECDSA_do_sign(), RSA_public_encrypt(), RSA_private_decrypt() functions for pairwise consistency tests (BZ#2178034)
-
In FIPS mode, openssl should enter error state when DH PCT fails (BZ#2178039)
-
In FIPS mode, openssl should always run the PBKDF2 lower bounds checks or provide an indicator when the pkcs5 parameter is set to 1 (BZ#2178137)
-
Support requiring EMS in TLS 1.2, default to it when in FIPS mode (BZ#2188046)
-
OpenSSL rsa_verify_recover doesn't use the same key checks as rsa_verify in FIPS mode (BZ#2188052)
-
RHEL9.0 - sshd dumps core when ibmca engine is configured with default_algorithms = CIPHERS or ALL (openssl) (BZ#2211396)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for x86_64 | 9 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 9.6 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 9.4 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 9.2 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 9.6 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 9.4 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 9.2 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Life Cycle | 9.6 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Life Cycle | 9.4 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Life Cycle | 9.2 | x86_64 |
| Red Hat Enterprise Linux for Power, little endian | 9 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 9.6 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 9.4 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 9.2 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Life Cycle | 9.6 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Life Cycle | 9.4 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Life Cycle | 9.2 | ppc64le |
| Red Hat Enterprise Linux for IBM z Systems | 9 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 9.6 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 9.4 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 9.2 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Life Cycle | 9.6 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Life Cycle | 9.4 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Life Cycle | 9.2 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - 4 years of updates | 9.6 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - 4 years of updates | 9.4 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - 4 years of updates | 9.2 | s390x |
| Red Hat Enterprise Linux for ARM 64 | 9 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Update Support | 9.6 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Update Support | 9.4 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Update Support | 9.2 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Life Cycle | 9.6 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Life Cycle | 9.4 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Life Cycle | 9.2 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - 4 years of updates | 9.6 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - 4 years of updates | 9.4 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - 4 years of updates | 9.2 | aarch64 |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 9.6 | ppc64le |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 9.4 | ppc64le |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 9.2 | ppc64le |
| Red Hat Enterprise Linux Server - AUS | 9.6 | x86_64 |
| Red Hat Enterprise Linux Server - AUS | 9.4 | x86_64 |
| Red Hat Enterprise Linux Server - AUS | 9.2 | x86_64 |
Updated Packages
- openssl-devel-3.0.7-16.el9_2.i686.rpm
- openssl-debuginfo-3.0.7-16.el9_2.aarch64.rpm
- openssl-perl-3.0.7-16.el9_2.x86_64.rpm
- openssl-debuginfo-3.0.7-16.el9_2.x86_64.rpm
- openssl-debugsource-3.0.7-16.el9_2.i686.rpm
- openssl-debugsource-3.0.7-16.el9_2.x86_64.rpm
- openssl-devel-3.0.7-16.el9_2.x86_64.rpm
- openssl-3.0.7-16.el9_2.ppc64le.rpm
- openssl-debuginfo-3.0.7-16.el9_2.s390x.rpm
- openssl-libs-3.0.7-16.el9_2.ppc64le.rpm
- openssl-libs-debuginfo-3.0.7-16.el9_2.s390x.rpm
- openssl-debuginfo-3.0.7-16.el9_2.i686.rpm
- openssl-libs-3.0.7-16.el9_2.i686.rpm
- openssl-libs-debuginfo-3.0.7-16.el9_2.aarch64.rpm
- openssl-libs-debuginfo-3.0.7-16.el9_2.ppc64le.rpm
- openssl-libs-debuginfo-3.0.7-16.el9_2.x86_64.rpm
- openssl-3.0.7-16.el9_2.s390x.rpm
- openssl-3.0.7-16.el9_2.x86_64.rpm
- openssl-devel-3.0.7-16.el9_2.aarch64.rpm
- openssl-perl-3.0.7-16.el9_2.ppc64le.rpm
- openssl-debugsource-3.0.7-16.el9_2.aarch64.rpm
- openssl-libs-debuginfo-3.0.7-16.el9_2.i686.rpm
- openssl-perl-3.0.7-16.el9_2.aarch64.rpm
- openssl-libs-3.0.7-16.el9_2.s390x.rpm
- openssl-debuginfo-3.0.7-16.el9_2.ppc64le.rpm
- openssl-3.0.7-16.el9_2.aarch64.rpm
- openssl-devel-3.0.7-16.el9_2.s390x.rpm
- openssl-devel-3.0.7-16.el9_2.ppc64le.rpm
- openssl-perl-3.0.7-16.el9_2.s390x.rpm
- openssl-3.0.7-16.el9_2.src.rpm
- openssl-debugsource-3.0.7-16.el9_2.s390x.rpm
- openssl-debugsource-3.0.7-16.el9_2.ppc64le.rpm
- openssl-libs-3.0.7-16.el9_2.aarch64.rpm
- openssl-libs-3.0.7-16.el9_2.x86_64.rpm
Fixes
- This content is not included.BZ - 2175860
- This content is not included.BZ - 2175864
- This content is not included.BZ - 2175868
- This content is not included.BZ - 2175873
- This content is not included.BZ - 2178029
- This content is not included.BZ - 2178030
- This content is not included.BZ - 2178034
- This content is not included.BZ - 2178039
- This content is not included.BZ - 2178137
- This content is not included.BZ - 2179379
- This content is not included.BZ - 2181082
- This content is not included.BZ - 2182561
- This content is not included.BZ - 2182565
- This content is not included.BZ - 2188046
- This content is not included.BZ - 2188052
- This content is not included.BZ - 2188461
- This content is not included.BZ - 2207947
CVEs
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.