git: 14798d61ba89 - main - security/vuxml: Add/update OpenSSL vulnerability
Date: Tue, 05 Jul 2022 14:52:32 UTC
The branch main has been updated by brnrd: URL: https://cgit.FreeBSD.org/ports/commit/?id=14798d61ba89013c033dfb5027635c0457db2dec commit 14798d61ba89013c033dfb5027635c0457db2dec Author: Bernard Spil <brnrd@FreeBSD.org> AuthorDate: 2022-07-05 14:51:47 +0000 Commit: Bernard Spil <brnrd@FreeBSD.org> CommitDate: 2022-07-05 14:51:47 +0000 security/vuxml: Add/update OpenSSL vulnerability * Update the RSA key AVX512 vuln to 3.0.4 only * Add new AES OCB vuln in 1.1.1q/3.0.5 --- security/vuxml/vuln-2022.xml | 58 ++++++++++++++++++++++++++++++++++++-------- 1 file changed, 48 insertions(+), 10 deletions(-) diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml index c64fc8950f02..9a4f093ac4fb 100644 --- a/security/vuxml/vuln-2022.xml +++ b/security/vuxml/vuln-2022.xml @@ -1,3 +1,37 @@ + <vuln vid="a28e8b7e-fc70-11ec-856e-d4c9ef517024"> + <topic>OpenSSL -- AES OCB fails to encrypt some bytes</topic> + <affects> + <package> + <name>openssl</name> + <range><lt>1.1.1q,1</lt></range> + </package> + <package> + <name>openssl-devel</name> + <range><lt>3.0.5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The OpenSSL project reports:</p> + <blockquote cite="https://www.openssl.org/news/secadv/20220705.txt"> + <p>AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised + implementation will not encrypt the entirety of the data under some + circumstances. This could reveal sixteen bytes of data that was + preexisting in the memory that wasn't written. In the special case of + "in place" encryption, sixteen bytes of the plaintext would be revealed.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2022-2097</cvename> + <url>https://www.openssl.org/news/secadv/20220705.txt</url> + </references> + <dates> + <discovery>2022-07-05</discovery> + <entry>2022-07-05</entry> + </dates> + </vuln> + <vuln vid="5be19b0d-fb85-11ec-95cd-080027b24e86"> <topic>Django -- multiple vulnerabilities</topic> <affects> @@ -35,34 +69,38 @@ </vuln> <vuln vid="f0e45968-faff-11ec-856e-d4c9ef517024"> - <topic>OpenSSL -- Bug in RSA implementation for AVX512IFMA</topic> + <topic>OpenSSL -- Heap memory corruption with RSA private key operation</topic> <affects> - <package> - <name>openssl</name> - <range><lt>1.1.1q,1</lt></range> - </package> <package> <name>openssl-devel</name> - <range><lt>3.0.5</lt></range> + <range><ge>3.0.4</ge><lt>3.0.5</lt></range> </package> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> <p>The OpenSSL project reports:</p> <blockquote cite="https://mta.openssl.org/pipermail/openssl-announce/2022-July/000229.html"> - <p>One of the issues fixed in the 3.0.5 release is the - CVE-2022-2274 (Bug in RSA implementation for AVX512IFMA - capable CPUs) which is already public</p> + <p>The OpenSSL 3.0.4 release introduced a serious bug in the RSA + implementation for X86_64 CPUs supporting the AVX512IFMA instructions. + This issue makes the RSA implementation with 2048 bit private keys + incorrect on such machines and memory corruption will happen during + the computation. As a consequence of the memory corruption an attacker + may be able to trigger a remote code execution on the machine performing + the computation.</p> + <p>SSL/TLS servers or other servers using 2048 bit RSA private keys running + on machines supporting AVX512IFMA instructions of the X86_64 architecture + are affected by this issue.</p> </blockquote> </body> </description> <references> <cvename>CVE-2022-2274</cvename> - <url>https://mta.openssl.org/pipermail/openssl-announce/2022-July/000229.html</url> + <url>https://www.openssl.org/news/secadv/20220705.txt</url> </references> <dates> <discovery>2022-07-01</discovery> <entry>2022-07-03</entry> + <modified>2022-07-05</modified> </dates> </vuln>