Lucene search

K
redhatRedHatRHSA-2022:6224
HistoryAug 30, 2022 - 3:46 p.m.

(RHSA-2022:6224) Moderate: openssl security and bug fix update

2022-08-3015:46:32
access.redhat.com
59

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.097 Low

EPSS

Percentile

94.7%

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.

Security Fix(es):

  • openssl: c_rehash script allows command injection (CVE-2022-1292)

  • openssl: Signer certificate verification returns inaccurate response when using OCSP_NOCHECKS (CVE-2022-1343)

  • openssl: OPENSSL_LH_flush() breaks reuse of memory (CVE-2022-1473)

  • openssl: the c_rehash script allows command injection (CVE-2022-2068)

  • openssl: AES OCB fails to encrypt some bytes (CVE-2022-2097)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • openssl occasionally sends internal error to gnutls when using FFDHE (BZ#2080323)

  • openssl req defaults to 3DES (BZ#2085499)

  • OpenSSL accepts custom elliptic curve parameters when p is large [rhel-9] (BZ#2085508)

  • OpenSSL mustn’t work with ECDSA with explicit curve parameters in FIPS mode (BZ#2085521)

  • openssl s_server -groups secp256k1 in FIPS fails because X25519/X448 (BZ#2086554)

  • Converting FIPS power-on self test to KAT (BZ#2086866)

  • Small RSA keys work for some operations in FIPS mode (BZ#2091938)

  • FIPS provider doesn’t block RSA encryption for key transport (BZ#2091977)

  • OpenSSL testsuite certificates expired (BZ#2095696)

  • [IBM 9.1 HW OPT] POWER10 performance enhancements for cryptography: OpenSSL (BZ#2103044)

  • [FIPS lab review] self-test (BZ#2112978)

  • [FIPS lab review] DH tuning (BZ#2115856)

  • [FIPS lab review] EC tuning (BZ#2115857)

  • [FIPS lab review] RSA tuning (BZ#2115858)

  • [FIPS lab review] RAND tuning (BZ#2115859)

  • [FIPS lab review] zeroization (BZ#2115861)

  • [FIPS lab review] HKDF limitations (BZ#2118388)

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.097 Low

EPSS

Percentile

94.7%

Related for RHSA-2022:6224