2024-12-12 21:07:30 +00:00

111 lines
5.7 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20235753",
"Version": "oval:org.altlinux.errata:def:20235753",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2023-5753: package `openssl3` update to version 3.1.3-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2023-5753",
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-5753",
"Source": "ALTPU"
},
{
"RefID": "CVE-2023-4807",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4807",
"Source": "CVE"
}
],
"Description": "This update upgrades openssl3 to version 3.1.3-alt1. \nSecurity Fix(es):\n\n * CVE-2023-4807: Issue summary: The POLY1305 MAC (message authentication code) implementation\ncontains a bug that might corrupt the internal state of applications on the\nWindows 64 platform when running on newer X86_64 processors supporting the\nAVX512-IFMA instructions.\n\nImpact summary: If in an application that uses the OpenSSL library an attacker\ncan influence whether the POLY1305 MAC algorithm is used, the application\nstate might be corrupted with various application dependent consequences.\n\nThe POLY1305 MAC (message authentication code) implementation in OpenSSL does\nnot save the contents of non-volatile XMM registers on Windows 64 platform\nwhen calculating the MAC of data larger than 64 bytes. Before returning to\nthe caller all the XMM registers are set to zero rather than restoring their\nprevious content. The vulnerable code is used only on newer x86_64 processors\nsupporting the AVX512-IFMA instructions.\n\nThe consequences of this kind of internal application state corruption can\nbe various - from no consequences, if the calling application does not\ndepend on the contents of non-volatile XMM registers at all, to the worst\nconsequences, where the attacker could get complete control of the application\nprocess. However given the contents of the registers are just zeroized so\nthe attacker cannot put arbitrary values inside, the most likely consequence,\nif any, would be an incorrect result of some application dependent\ncalculations or a crash leading to a denial of service.\n\nThe POLY1305 MAC algorithm is most frequently used as part of the\nCHACHA20-POLY1305 AEAD (authenticated encryption with associated data)\nalgorithm. The most common usage of this AEAD cipher is with TLS protocol\nversions 1.2 and 1.3 and a malicious client can influence whether this AEAD\ncipher is used by the server. This implies that server applications using\nOpenSSL can be potentially impacted. However we are currently not aware of\nany concrete application that would be affected by this issue therefore we\nconsider this a Low severity security issue.\n\nAs a workaround the AVX512-IFMA instructions support can be disabled at\nruntime by setting the environment variable OPENSSL_ia32cap:\n\n OPENSSL_ia32cap=:~0x200000\n\nThe FIPS provider is not affected by this issue.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2023-09-20"
},
"Updated": {
"Date": "2023-09-20"
},
"BDUs": null,
"CVEs": [
{
"ID": "CVE-2023-4807",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4807",
"Impact": "High",
"Public": "20230908"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20235753001",
"Comment": "libcrypto3 is earlier than 0:3.1.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235753002",
"Comment": "libssl-devel is earlier than 0:3.1.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235753003",
"Comment": "libssl-devel-static is earlier than 0:3.1.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235753004",
"Comment": "libssl3 is earlier than 0:3.1.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235753005",
"Comment": "openssl is earlier than 0:3.1.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235753006",
"Comment": "openssl-doc is earlier than 0:3.1.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235753007",
"Comment": "openssl-engines is earlier than 0:3.1.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235753008",
"Comment": "tsget is earlier than 0:3.1.3-alt1"
}
]
}
]
}
}
]
}