2024-12-12 21:07:30 +00:00

209 lines
13 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20231228",
"Version": "oval:org.altlinux.errata:def:20231228",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2023-1228: package `openssl1.1` update to version 1.1.1t-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2023-1228",
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-1228",
"Source": "ALTPU"
},
{
"RefID": "BDU:2023-00665",
"RefURL": "https://bdu.fstec.ru/vul/2023-00665",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00675",
"RefURL": "https://bdu.fstec.ru/vul/2023-00675",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02237",
"RefURL": "https://bdu.fstec.ru/vul/2023-02237",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02240",
"RefURL": "https://bdu.fstec.ru/vul/2023-02240",
"Source": "BDU"
},
{
"RefID": "CVE-2022-4304",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4304",
"Source": "CVE"
},
{
"RefID": "CVE-2022-4450",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4450",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0215",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0215",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0286",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0286",
"Source": "CVE"
}
],
"Description": "This update upgrades openssl1.1 to version 1.1.1t-alt1. \nSecurity Fix(es):\n\n * BDU:2023-00665: Уязвимость функции GENERAL_NAME_cmp библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00675: Уязвимость функции BIO_new_NDEF() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02237: Уязвимость алгоритмов шифрования PKCS#1 v1.5, RSA-OEAP и RSASVE криптографической библиотеки OpenSSL, позволяющая нарушителю реализовать атаку Блейхенбахера (Bleichenbacher)\n\n * BDU:2023-02240: Уязвимость функции PEM_read_bio_ex() криптографической библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2022-4304: A timing based side channel exists in the OpenSSL RSA Decryption implementation\nwhich could be sufficient to recover a plaintext across a network in a\nBleichenbacher style attack. To achieve a successful decryption an attacker\nwould have to be able to send a very large number of trial messages for\ndecryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5,\nRSA-OEAP and RSASVE.\n\nFor example, in a TLS connection, RSA is commonly used by a client to send an\nencrypted pre-master secret to the server. An attacker that had observed a\ngenuine connection between a client and a server could use this flaw to send\ntrial messages to the server and record the time taken to process them. After a\nsufficiently large number of messages the attacker could recover the pre-master\nsecret used for the original connection and thus be able to decrypt the\napplication data sent over that connection.\n\n\n\n * CVE-2022-4450: The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and\ndecodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data.\nIf the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are\npopulated with pointers to buffers containing the relevant decoded data. The\ncaller is responsible for freeing those buffers. It is possible to construct a\nPEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex()\nwill return a failure code but will populate the header argument with a pointer\nto a buffer that has already been freed. If the caller also frees this buffer\nthen a double free will occur. This will most likely lead to a crash. This\ncould be exploited by an attacker who has the ability to supply malicious PEM\nfiles for parsing to achieve a denial of service attack.\n\nThe functions PEM_read_bio() and PEM_read() are simple wrappers around\nPEM_read_bio_ex() and therefore these functions are also directly affected.\n\nThese functions are also called indirectly by a number of other OpenSSL\nfunctions including PEM_X509_INFO_read_bio_ex() and\nSSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal\nuses of these functions are not vulnerable because the caller does not free the\nheader argument if PEM_read_bio_ex() returns a failure code. These locations\ninclude the PEM_read_bio_TYPE() functions as well as the decoders introduced in\nOpenSSL 3.0.\n\nThe OpenSSL asn1parse command line application is also impacted by this issue.\n\n\n\n\n * CVE-2023-0215: The public API function BIO_new_NDEF is a helper function used for streaming\nASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the\nSMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by\nend user applications.\n\nThe function receives a BIO from the caller, prepends a new BIO_f_asn1 filter\nBIO onto the front of it to form a BIO chain, and then returns the new head of\nthe BIO chain to the caller. Under certain conditions, for example if a CMS\nrecipient public key is invalid, the new filter BIO is freed and the function\nreturns a NULL result indicating a failure. However, in this case, the BIO chain\nis not properly cleaned up and the BIO passed by the caller still retains\ninternal pointers to the previously freed filter BIO. If the caller then goes on\nto call BIO_pop() on the BIO then a use-after-free will occur. This will most\nlikely result in a crash.\n\n\n\nThis scenario occurs directly in the internal function B64_write_ASN1() which\nmay cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on\nthe BIO. This internal function is in turn called by the public API functions\nPEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream,\nSMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7.\n\nOther public API functions that may be impacted by this include\ni2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and\ni2d_PKCS7_bio_stream.\n\nThe OpenSSL cms and smime command line applications are similarly affected.\n\n\n\n\n\n * CVE-2023-0286: There is a type confusion vulnerability relating to X.400 address processing\ninside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but\nthe public structure definition for GENERAL_NAME incorrectly specified the type\nof the x400Address field as ASN1_TYPE. This field is subsequently interpreted by\nthe OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an\nASN1_STRING.\n\nWhen CRL checking is enabled (i.e. the application sets the\nX509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass\narbitrary pointers to a memcmp call, enabling them to read memory contents or\nenact a denial of service. In most cases, the attack requires the attacker to\nprovide both the certificate chain and CRL, neither of which need to have a\nvalid signature. If the attacker only controls one of these inputs, the other\ninput must already contain an X.400 address as a CRL distribution point, which\nis uncommon. As such, this vulnerability is most likely to only affect\napplications which have implemented their own functionality for retrieving CRLs\nover a network.\n\n",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2023-02-10"
},
"Updated": {
"Date": "2023-02-10"
},
"BDUs": [
{
"ID": "BDU:2023-00665",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-704",
"Href": "https://bdu.fstec.ru/vul/2023-00665",
"Impact": "High",
"Public": "20230207"
},
{
"ID": "BDU:2023-00675",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-416, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-00675",
"Impact": "Low",
"Public": "20221129"
},
{
"ID": "BDU:2023-02237",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-208",
"Href": "https://bdu.fstec.ru/vul/2023-02237",
"Impact": "Low",
"Public": "20200714"
},
{
"ID": "BDU:2023-02240",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-415",
"Href": "https://bdu.fstec.ru/vul/2023-02240",
"Impact": "High",
"Public": "20211208"
}
],
"CVEs": [
{
"ID": "CVE-2022-4304",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-203",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4304",
"Impact": "Low",
"Public": "20230208"
},
{
"ID": "CVE-2022-4450",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4450",
"Impact": "High",
"Public": "20230208"
},
{
"ID": "CVE-2023-0215",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0215",
"Impact": "High",
"Public": "20230208"
},
{
"ID": "CVE-2023-0286",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0286",
"Impact": "High",
"Public": "20230208"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:5001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20231228001",
"Comment": "libcrypto1.1 is earlier than 0:1.1.1t-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231228002",
"Comment": "libssl-devel is earlier than 0:1.1.1t-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231228003",
"Comment": "libssl-devel-static is earlier than 0:1.1.1t-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231228004",
"Comment": "libssl1.1 is earlier than 0:1.1.1t-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231228005",
"Comment": "openssl is earlier than 0:1.1.1t-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231228006",
"Comment": "openssl-doc is earlier than 0:1.1.1t-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231228007",
"Comment": "openssl-engines is earlier than 0:1.1.1t-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231228008",
"Comment": "tsget is earlier than 0:1.1.1t-alt1"
}
]
}
]
}
}
]
}