[RHSA-2024:2447] openssl and openssl-fips-provider security update
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
openssl: AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries (CVE-2023-2975)
openssl: Excessive time spent checking DH keys and parameters (CVE-2023-3446)
OpenSSL: Excessive time spent checking DH q parameter value (CVE-2023-3817)
openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow (CVE-2023-5678)
openssl: POLY1305 MAC implementation corrupts vector registers on PowerPC (CVE-2023-6129)
openssl: Excessive time spent checking invalid RSA public keys (CVE-2023-6237)
openssl: denial of service via null dereference (CVE-2024-0727)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.
- ID
- RHSA-2024:2447
- Severity
- low
- URL
- https://access.redhat.com/errata/RHSA-2024:2447
- Published
-
2024-04-30T00:00:00
(4 months ago) - Modified
-
2024-04-30T00:00:00
(4 months ago) - Rights
- Copyright 2024 Red Hat, Inc.
- Other Advisories
-
- ALAS-2023-1843
- ALAS-2023-1891
- ALAS2-2023-2205
- ALAS2-2023-2226
- ALAS2-2023-2246
- ALAS2-2023-2350
- ALAS2-2023-2351
- ALAS2-2024-2478
- ALAS2-2024-2479
- ALAS2-2024-2483
- ALAS2-2024-2502
- ALPINE:CVE-2023-2975
- ALPINE:CVE-2023-3446
- ALPINE:CVE-2023-3817
- ALPINE:CVE-2023-5678
- ALPINE:CVE-2023-6129
- ALPINE:CVE-2023-6237
- ALPINE:CVE-2024-0727
- ALSA-2023:7877
- ALSA-2024:0888
- ALSA-2024:2264
- ALSA-2024:2447
- ELSA-2023-7877
- ELSA-2024-0888
- ELSA-2024-12056
- ELSA-2024-2264
- ELSA-2024-2447
- FREEBSD:10DEE731-C069-11EE-9190-84A93843EB75
- FREEBSD:22DF5074-71CD-11EE-85EB-84A93843EB75
- FREEBSD:41C60E16-2405-11EE-A0D1-84A93843EB75
- FREEBSD:8337251B-B07B-11EE-B0D7-84A93843EB75
- FREEBSD:A5956603-7E4F-11EE-9DF6-84A93843EB75
- FREEBSD:BAD6588E-2FE0-11EE-A0D1-84A93843EB75
- GLSA-202402-08
- MS:CVE-2023-3817
- RHSA-2023:7877
- RHSA-2024:0888
- RHSA-2024:2264
- RLSA-2024:2264
- SSA:2023-213-01
- SSA:2024-199-01
- SUSE-SU-2023:2961-1
- SUSE-SU-2023:2962-1
- SUSE-SU-2023:2964-1
- SUSE-SU-2023:2965-1
- SUSE-SU-2023:2972-1
- SUSE-SU-2023:2973-1
- SUSE-SU-2023:3011-1
- SUSE-SU-2023:3012-1
- SUSE-SU-2023:3013-1
- SUSE-SU-2023:3093-1
- SUSE-SU-2023:3096-1
- SUSE-SU-2023:3160-1
- SUSE-SU-2023:3179-1
- SUSE-SU-2023:3239-1
- SUSE-SU-2023:3242-1
- SUSE-SU-2023:3243-1
- SUSE-SU-2023:3244-1
- SUSE-SU-2023:3244-2
- SUSE-SU-2023:3291-1
- SUSE-SU-2023:3291-2
- SUSE-SU-2023:3308-1
- SUSE-SU-2023:3338-1
- SUSE-SU-2023:3339-1
- SUSE-SU-2023:3397-1
- SUSE-SU-2023:3958-1
- SUSE-SU-2023:4189-1
- SUSE-SU-2023:4190-1
- SUSE-SU-2023:4488-1
- SUSE-SU-2023:4489-1
- SUSE-SU-2023:4518-1
- SUSE-SU-2023:4519-1
- SUSE-SU-2023:4520-1
- SUSE-SU-2023:4521-1
- SUSE-SU-2023:4522-1
- SUSE-SU-2023:4523-1
- SUSE-SU-2023:4524-1
- SUSE-SU-2023:4593-1
- SUSE-SU-2023:4635-1
- SUSE-SU-2023:4649-1
- SUSE-SU-2023:4918-1
- SUSE-SU-2023:4919-1
- SUSE-SU-2024:0172-1
- SUSE-SU-2024:0518-1
- SUSE-SU-2024:0549-1
- SUSE-SU-2024:0813-1
- SUSE-SU-2024:0814-1
- SUSE-SU-2024:0815-1
- SUSE-SU-2024:0831-1
- SUSE-SU-2024:0832-1
- SUSE-SU-2024:0833-1
- SUSE-SU-2024:0840-1
- SUSE-SU-2024:0841-1
- SUSE-SU-2024:0842-1
- USN-6435-1
- USN-6435-2
- USN-6450-1
- USN-6622-1
- USN-6632-1
- USN-6709-1
- USN-7018-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2223016 | https://bugzilla.redhat.com/2223016 | |
Bugzilla | 2224962 | https://bugzilla.redhat.com/2224962 | |
Bugzilla | 2227852 | https://bugzilla.redhat.com/2227852 | |
Bugzilla | 2248616 | https://bugzilla.redhat.com/2248616 | |
Bugzilla | 2257571 | https://bugzilla.redhat.com/2257571 | |
Bugzilla | 2258502 | https://bugzilla.redhat.com/2258502 | |
Bugzilla | 2259944 | https://bugzilla.redhat.com/2259944 | |
RHSA | RHSA-2024:2447 | https://access.redhat.com/errata/RHSA-2024:2447 | |
CVE | CVE-2023-2975 | https://access.redhat.com/security/cve/CVE-2023-2975 | |
CVE | CVE-2023-3446 | https://access.redhat.com/security/cve/CVE-2023-3446 | |
CVE | CVE-2023-3817 | https://access.redhat.com/security/cve/CVE-2023-3817 | |
CVE | CVE-2023-5678 | https://access.redhat.com/security/cve/CVE-2023-5678 | |
CVE | CVE-2023-6129 | https://access.redhat.com/security/cve/CVE-2023-6129 | |
CVE | CVE-2023-6237 | https://access.redhat.com/security/cve/CVE-2023-6237 | |
CVE | CVE-2024-0727 | https://access.redhat.com/security/cve/CVE-2024-0727 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/openssl?arch=x86_64&distro=redhat-9 | redhat | openssl | < 3.0.7-27.el9 | redhat-9 | x86_64 | |
Affected | pkg:rpm/redhat/openssl?arch=s390x&distro=redhat-9 | redhat | openssl | < 3.0.7-27.el9 | redhat-9 | s390x | |
Affected | pkg:rpm/redhat/openssl?arch=ppc64le&distro=redhat-9 | redhat | openssl | < 3.0.7-27.el9 | redhat-9 | ppc64le | |
Affected | pkg:rpm/redhat/openssl?arch=aarch64&distro=redhat-9 | redhat | openssl | < 3.0.7-27.el9 | redhat-9 | aarch64 | |
Affected | pkg:rpm/redhat/openssl-perl?arch=x86_64&distro=redhat-9 | redhat | openssl-perl | < 3.0.7-27.el9 | redhat-9 | x86_64 | |
Affected | pkg:rpm/redhat/openssl-perl?arch=s390x&distro=redhat-9 | redhat | openssl-perl | < 3.0.7-27.el9 | redhat-9 | s390x | |
Affected | pkg:rpm/redhat/openssl-perl?arch=ppc64le&distro=redhat-9 | redhat | openssl-perl | < 3.0.7-27.el9 | redhat-9 | ppc64le | |
Affected | pkg:rpm/redhat/openssl-perl?arch=aarch64&distro=redhat-9 | redhat | openssl-perl | < 3.0.7-27.el9 | redhat-9 | aarch64 | |
Affected | pkg:rpm/redhat/openssl-libs?arch=x86_64&distro=redhat-9 | redhat | openssl-libs | < 3.0.7-27.el9 | redhat-9 | x86_64 | |
Affected | pkg:rpm/redhat/openssl-libs?arch=s390x&distro=redhat-9 | redhat | openssl-libs | < 3.0.7-27.el9 | redhat-9 | s390x | |
Affected | pkg:rpm/redhat/openssl-libs?arch=ppc64le&distro=redhat-9 | redhat | openssl-libs | < 3.0.7-27.el9 | redhat-9 | ppc64le | |
Affected | pkg:rpm/redhat/openssl-libs?arch=i686&distro=redhat-9 | redhat | openssl-libs | < 3.0.7-27.el9 | redhat-9 | i686 | |
Affected | pkg:rpm/redhat/openssl-libs?arch=aarch64&distro=redhat-9 | redhat | openssl-libs | < 3.0.7-27.el9 | redhat-9 | aarch64 | |
Affected | pkg:rpm/redhat/openssl-devel?arch=x86_64&distro=redhat-9 | redhat | openssl-devel | < 3.0.7-27.el9 | redhat-9 | x86_64 | |
Affected | pkg:rpm/redhat/openssl-devel?arch=s390x&distro=redhat-9 | redhat | openssl-devel | < 3.0.7-27.el9 | redhat-9 | s390x | |
Affected | pkg:rpm/redhat/openssl-devel?arch=ppc64le&distro=redhat-9 | redhat | openssl-devel | < 3.0.7-27.el9 | redhat-9 | ppc64le | |
Affected | pkg:rpm/redhat/openssl-devel?arch=i686&distro=redhat-9 | redhat | openssl-devel | < 3.0.7-27.el9 | redhat-9 | i686 | |
Affected | pkg:rpm/redhat/openssl-devel?arch=aarch64&distro=redhat-9 | redhat | openssl-devel | < 3.0.7-27.el9 | redhat-9 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |