Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:4586-1

Опубликовано: 20 дек. 2022
Источник: suse-cvrf

Описание

Security update for openssl-3

This update for openssl-3 fixes the following issues:

  • CVE-2022-3996: Fixed X.509 Policy Constraints Double Locking (bsc#1206374)

Список пакетов

SUSE Linux Enterprise Module for Basesystem 15 SP4
libopenssl-3-devel-3.0.1-150400.4.14.1
libopenssl3-3.0.1-150400.4.14.1
openssl-3-3.0.1-150400.4.14.1
openSUSE Leap 15.4
libopenssl-3-devel-3.0.1-150400.4.14.1
libopenssl-3-devel-32bit-3.0.1-150400.4.14.1
libopenssl3-3.0.1-150400.4.14.1
libopenssl3-32bit-3.0.1-150400.4.14.1
openssl-3-3.0.1-150400.4.14.1
openssl-3-doc-3.0.1-150400.4.14.1

Описание

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.


Затронутые продукты
SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.1-150400.4.14.1
SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.1-150400.4.14.1
SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.1-150400.4.14.1
openSUSE Leap 15.4:libopenssl-3-devel-3.0.1-150400.4.14.1

Ссылки

Описание

If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affected process hangs. Policy processing being enabled on a publicly facing server is not considered to be a common setup. Policy processing is enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function. Update (31 March 2023): The description of the policy processing enablement was corrected based on CVE-2023-0466.


Затронутые продукты
SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.1-150400.4.14.1
SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.1-150400.4.14.1
SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.1-150400.4.14.1
openSUSE Leap 15.4:libopenssl-3-devel-3.0.1-150400.4.14.1

Ссылки