跳转到帖子

Oracle Linux: CVE-2023-6237: ELSA-2024-2447: openssl and openssl-fips-provider security update (LOW) (Multiple Advisories)

recommended_posts

发布于
  • Members

Oracle Linux: CVE-2023-6237: ELSA-2024-2447:openssl and openssl-fips-provider security update (LOW) (Multiple Advisories)

Severity
5
CVSS
(AV:N/AC:H/Au:N/C:N/I:N/A:C)
Published
01/15/2024
Created
05/22/2024
Added
05/07/2024
Modified
12/01/2024

Description

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that application is also vulnerable if used with the '-pubin' and '-check' options on untrusted data. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are affected by this issue. A flaw was found in OpenSSL. When the EVP_PKEY_public_check() function is called in RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is a large prime, this computation takes a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack.

Solution(s)

  • oracle-linux-upgrade-edk2-aarch64
  • oracle-linux-upgrade-edk2-ovmf
  • oracle-linux-upgrade-edk2-tools
  • oracle-linux-upgrade-edk2-tools-doc
  • oracle-linux-upgrade-openssl
  • oracle-linux-upgrade-openssl-devel
  • oracle-linux-upgrade-openssl-fips-provider
  • oracle-linux-upgrade-openssl-libs
  • oracle-linux-upgrade-openssl-perl

References

  • https://attackerkb.com/topics/cve-2023-6237
  • CVE - 2023-6237
  • ELSA-2024-2447
  • ELSA-2024-9088
  • 查看数 703
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…