From nobody Tue Jul 05 15:32:56 2022 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4295E1D07E4B; Tue, 5 Jul 2022 15:33:00 +0000 (UTC) (envelope-from cy.schubert@cschubert.com) Received: from omta002.cacentral1.a.cloudfilter.net (omta002.cacentral1.a.cloudfilter.net [3.97.99.33]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "Client", Issuer "CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Lcms724Rgz4WZl; Tue, 5 Jul 2022 15:32:59 +0000 (UTC) (envelope-from cy.schubert@cschubert.com) Received: from shw-obgw-4001a.ext.cloudfilter.net ([10.228.9.142]) by cmsmtp with ESMTP id 8b4qo5BuaSp398kXqol2Fe; Tue, 05 Jul 2022 15:32:58 +0000 Received: from spqr.komquats.com ([70.66.148.124]) by cmsmtp with ESMTPA id 8kXooutLeuJww8kXpoddRn; Tue, 05 Jul 2022 15:32:58 +0000 X-Authority-Analysis: v=2.4 cv=F+BEy4tN c=1 sm=1 tr=0 ts=62c459aa a=Cwc3rblV8FOMdVN/wOAqyQ==:117 a=Cwc3rblV8FOMdVN/wOAqyQ==:17 a=RgO8CyIxsXoA:10 a=XldT38RWNwACPDQzwzUA:9 a=6I5d2MoRAAAA:8 a=SSmOFEACAAAA:8 a=Ntg_Zx-WAAAA:8 a=N5v5GtwXpBZ3OBzXF1sA:9 a=CjuIK1q_8ugA:10 a=dLpyCq2JSmyH2e-2MKoA:9 a=wPNLvfGTeEIA:10 a=xp-KXMHDdBEA:10 a=-lRSiLz7bn4A:10 a=YxBL1-UpAAAA:8 a=EkcXrb_YAAAA:8 a=ics_IjAVWSmO8OVX31YA:9 a=BOg4e644cxQA:10 a=IjZwj45LgO3ly-622nXo:22 a=RUfouJl5KNV7104ufCm4:22 a=Ia-lj3WSrqcvXOmTRaiG:22 a=LK5xJRSDVpKd5WXXoEvA:22 Received: from slippy.cwsent.com (slippy [10.1.1.91]) by spqr.komquats.com (Postfix) with ESMTP id 69C111212; Tue, 5 Jul 2022 08:32:56 -0700 (PDT) Received: by slippy.cwsent.com (Postfix, from userid 1000) id 603E215D; Tue, 5 Jul 2022 08:32:56 -0700 (PDT) X-Mailer: exmh version 2.9.0 11/07/2018 with nmh-1.7+dev Reply-to: Cy Schubert From: Cy Schubert X-os: FreeBSD X-Sender: cy@cwsent.com X-URL: http://www.cschubert.com/ To: Bernard Spil cc: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: Re: git: 14798d61ba89 - main - security/vuxml: Add/update OpenSSL vulnerability In-reply-to: <202207051452.265EqWvF055331@gitrepo.freebsd.org> References: <202207051452.265EqWvF055331@gitrepo.freebsd.org> Comments: In-reply-to Bernard Spil message dated "Tue, 05 Jul 2022 14:52:32 +0000." List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-main@freebsd.org X-BeenThere: dev-commits-ports-main@freebsd.org Mime-Version: 1.0 Content-Type: multipart/mixed ; boundary="==_Exmh_1657035106_62160" Date: Tue, 05 Jul 2022 08:32:56 -0700 Message-Id: <20220705153256.603E215D@slippy.cwsent.com> X-CMAE-Envelope: MS4xfDqEMumPICOdc57H80noFoFDu64o5emjvM00cFQPQkFqgRU8puue6xqkNeIFSUJyC+xdLrchsBpKPoVSvtQuJUOqsos+cAl76GQKFKGFwjevPaHLLdch c3mxXT4+Vvf5zuMngVsU0b7cncjezR2yl4yFdCoQ785E9rFkQNPeyC2sdqXksqYwk1DJ9qPiZ7uBCxMJjGOOhaeskFrsqvLduDrKWXJDy8XqShOei5pJHhUj 0s1XrfMv20gsBkcYZhMM5jXeVqtzBdA8VZ2TqLAA4c0TPDlQ6l0xwuQSjp5tQvRv9VO6qgkftZfLt/IjQFKs/LDDlJ9Mxj3kMUA+Syc6Y1Q= X-Rspamd-Queue-Id: 4Lcms724Rgz4WZl X-Spamd-Bar: ++ Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of cy.schubert@cschubert.com has no SPF policy when checking 3.97.99.33) smtp.mailfrom=cy.schubert@cschubert.com X-Spamd-Result: default: False [2.72 / 15.00]; HAS_REPLYTO(0.00)[Cy.Schubert@cschubert.com]; RCVD_VIA_SMTP_AUTH(0.00)[]; TO_DN_SOME(0.00)[]; MV_CASE(0.50)[]; RCVD_COUNT_THREE(0.00)[4]; RCVD_IN_DNSWL_MED(-0.20)[3.97.99.33:from]; NEURAL_HAM_SHORT(-0.65)[-0.654]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:~,2:~,3:+,4:+]; ASN(0.00)[asn:16509, ipnet:3.96.0.0/15, country:US]; RCVD_TLS_LAST(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[70.66.148.124:received]; ARC_NA(0.00)[]; REPLYTO_EQ_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[multipart/mixed,text/plain]; DMARC_NA(0.00)[cschubert.com: no valid DMARC record]; AUTH_NA(1.00)[]; NEURAL_SPAM_MEDIUM(0.98)[0.977]; NEURAL_SPAM_LONG(1.00)[0.998]; MIME_HTML_ONLY(0.20)[]; MLMMJ_DEST(0.00)[dev-commits-ports-all,dev-commits-ports-main]; R_SPF_NA(0.00)[no SPF record] X-ThisMailContainsUnwantedMimeParts: N This is a multipart MIME message. --==_Exmh_1657035106_62160 Content-Type: text/plain; charset=us-ascii In message <202207051452.265EqWvF055331@gitrepo.freebsd.org>, Bernard Spil writ es: > The branch main has been updated by brnrd: > > URL: https://cgit.FreeBSD.org/ports/commit/?id=14798d61ba89013c033dfb5027635c > 0457db2dec > > commit 14798d61ba89013c033dfb5027635c0457db2dec > Author: Bernard Spil > AuthorDate: 2022-07-05 14:51:47 +0000 > Commit: Bernard Spil > CommitDate: 2022-07-05 14:51:47 +0000 > > security/vuxml: Add/update OpenSSL vulnerability > > * Update the RSA key AVX512 vuln to 3.0.4 only > * Add new AES OCB vuln in 1.1.1q/3.0.5 Reading the advisory myself it says, OpenSSL 1.1.1 and 1.0.2 are not affected by this issue. Is the advisory mistaken? > --- > security/vuxml/vuln-2022.xml | 58 ++++++++++++++++++++++++++++++++++++------ > -- > 1 file changed, 48 insertions(+), 10 deletions(-) > > diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml > index c64fc8950f02..9a4f093ac4fb 100644 > --- a/security/vuxml/vuln-2022.xml > +++ b/security/vuxml/vuln-2022.xml > @@ -1,3 +1,37 @@ > + > + OpenSSL -- AES OCB fails to encrypt some bytes > + > + > + openssl > + 1.1.1q,1 > + > + > + openssl-devel > + 3.0.5 > + > + > + > + > +

The OpenSSL project reports:

> +
> +

AES OCB mode for 32-bit x86 platforms using the AES-NI assembly op > timised > + implementation will not encrypt the entirety of the data under some > + circumstances. This could reveal sixteen bytes of data that was > + preexisting in the memory that wasn't written. In the special case > of > + "in place" encryption, sixteen bytes of the plaintext would be reve > aled.

> +
> + > +
> + > + CVE-2022-2097 > + https://www.openssl.org/news/secadv/20220705.txt > + > + > + 2022-07-05 > + 2022-07-05 > + > +
> + > > Django -- multiple vulnerabilities > > @@ -35,34 +69,38 @@ > > > > - OpenSSL -- Bug in RSA implementation for AVX512IFMA > + OpenSSL -- Heap memory corruption with RSA private key operation< > /topic> > > - > - openssl > - 1.1.1q,1 > - > > openssl-devel > - 3.0.5 > + 3.0.43.0.5 > > > > >

The OpenSSL project reports:

>
> -

One of the issues fixed in the 3.0.5 release is the > - CVE-2022-2274 (Bug in RSA implementation for AVX512IFMA > - capable CPUs) which is already public

> +

The OpenSSL 3.0.4 release introduced a serious bug in the RSA > + implementation for X86_64 CPUs supporting the AVX512IFMA instructio > ns. > + This issue makes the RSA implementation with 2048 bit private keys > + incorrect on such machines and memory corruption will happen during > + the computation. As a consequence of the memory corruption an attac > ker > + may be able to trigger a remote code execution on the machine perfo > rming > + the computation.

> +

SSL/TLS servers or other servers using 2048 bit RSA private keys r > unning > + on machines supporting AVX512IFMA instructions of the X86_64 archit > ecture > + are affected by this issue.

>
> >
> > CVE-2022-2274 > - https://mta.openssl.org/pipermail/openssl-announce/2022-July/0002 > 29.html > + https://www.openssl.org/news/secadv/20220705.txt > > > 2022-07-01 > 2022-07-03 > + 2022-07-05 > >
> > --==_Exmh_1657035106_62160 Content-Type: message/rfc822 ; name="7343" Content-Description: 7343 Return-Path: X-Original-To: cy@localhost Delivered-To: cy@localhost.cwsent.com Received: from slippy (localhost [IPv6:::1]) by slippy.cwsent.com (Postfix) with ESMTP id 534A7225 for ; Tue, 5 Jul 2022 05:44:55 -0700 (PDT) X-Original-To: slippy Delivered-To: slippy@komquats.com Received: from cwfw [10.1.1.254] by slippy with POP3 (fetchmail-6.4.30) for (single-drop); Tue, 05 Jul 2022 05:44:55 -0700 (PDT) Received: by spqr.komquats.com (Postfix, from userid 1000) id 8F464D9E; Tue, 5 Jul 2022 03:55:14 -0700 (PDT) X-Spam-Checker-Version: SpamAssassin 4.0.0-rsvnunknown (svnunknown) on cwfw.cwsent.com X-Spam-Level: X-Spam-Status: No, score=-2.2 required=5.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,MAILING_LIST_MULTI,PDS_BTC_ID,SPF_HELO_PASS,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=4.0.0-rsvnunknown X-Original-To: Cy.Schubert@cschubert.com Delivered-To: Cy.Schubert@cschubert.com Received: from mta.openssl.org (mta.openssl.org [194.97.150.230]) by spqr.komquats.com (Postfix) with ESMTPS id 6C230D76 for ; Tue, 5 Jul 2022 03:55:12 -0700 (PDT) Received: from mta.openssl.org (localhost [IPv6:::1]) by mta.openssl.org (Postfix) with ESMTP id 8605AE471D; Tue, 5 Jul 2022 10:43:46 +0000 (UTC) X-Original-To: openssl-announce@openssl.org Delivered-To: openssl-announce@mta.openssl.org Received: from dev.openssl.org (dev.opentls.org [IPv6:2001:608:c00:180::1:ea]) by mta.openssl.org (Postfix) with SMTP id 67567E4395; Tue, 5 Jul 2022 10:30:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=openssl.org; s=dkim-2020-2; t=1657017042; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=iBT7koXy6uhwLCNHy53DUTqgOtBQ17aSoUBZeiTjpfI=; b=QwgWj1uhbomj6um66sP/Gisd0A9AxnY3lBUv0ug7JsgH9aghDTxH+QBbV0dL/t76VsRLgr fp+Gdc9PWdGmD7KfQubeq3TVIhUdGYDfR5isk1x4dknT5fHXpQpuJgSWAyt6859VERDvrj ovZOMsNZiY0F2pSw+XbuaJzA42oFessxBjQQGoBjGAcMxVWrF81Awx6IgXf4bQWqjlt7Zy lmhWhh8Y3WuUvh4iOvuV8ccsG5SQvB8fkSn3oOKERUCitIErgppQcmU9uyLssKDONb/HId PoMhHQ4vNrM9BAb103xPjXYJPU7Ca7/gqUp1tFDyiuvPQabx3j2mfeh6W6PShw== Received: (nullmailer pid 991468 invoked by uid 29000); Tue, 05 Jul 2022 10:30:41 -0000 Date: Tue, 5 Jul 2022 10:30:41 +0000 From: OpenSSL To: openssl-project@openssl.org, OpenSSL User Support ML , OpenSSL Announce ML Subject: OpenSSL Security Advisory Message-ID: <20220705103041.GA991425@openssl.org> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit Organization: OpenSSL Project X-Web-Homepage: http://www.openssl.org/ Authentication-Results: mta.openssl.org; dkim=none; spf=pass (mta.openssl.org: domain of openssl@dev.openssl.org designates 2001:608:c00:180::1:ea as permitted sender) smtp.mailfrom=openssl@dev.openssl.org; dmarc=pass (policy=none) header.from=openssl.org X-Rspamd-Server: mta X-Spamd-Bar: / X-Rspamd-Queue-Id: 67567E4395 X-Spamd-Result: default: False [-0.50 / 15.00]; DMARC_POLICY_ALLOW(-0.50)[openssl.org,none]; FORGED_SENDER(0.30)[openssl@openssl.org,openssl@dev.openssl.org]; R_SPF_ALLOW(-0.20)[+a:c]; MIME_GOOD(-0.10)[text/plain]; NEURAL_HAM(-0.00)[-1.000]; ARC_NA(0.00)[]; RCVD_COUNT_ZERO(0.00)[0]; MIME_TRACE(0.00)[0:+]; R_DKIM_NA(0.00)[]; ASN(0.00)[asn:5539, ipnet:2001:608::/32, country:DE]; DKIM_SIGNED(0.00)[openssl.org:s=dkim-2020-2]; HAS_ORG_HEADER(0.00)[]; TO_DN_SOME(0.00)[]; FROM_HAS_DN(0.00)[]; HAS_REPLYTO(0.00)[openssl@openssl.org]; FROM_NEQ_ENVFROM(0.00)[openssl@openssl.org,openssl@dev.openssl.org]; RCPT_COUNT_THREE(0.00)[3]; REPLYTO_ADDR_EQ_FROM(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MID_RHS_MATCH_FROM(0.00)[] X-Mailman-Approved-At: Tue, 05 Jul 2022 10:33:36 +0000 X-BeenThere: openssl-announce@openssl.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-To: openssl-users@openssl.org, openssl@openssl.org Errors-To: openssl-announce-bounces@openssl.org Sender: "openssl-announce" -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 OpenSSL Security Advisory [5 July 2022] ======================================= Heap memory corruption with RSA private key operation (CVE-2022-2274) ===================================================================== Severity: High The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue. Note that on a vulnerable machine, proper testing of OpenSSL would fail and should be noticed before deployment. Users of the OpenSSL 3.0.4 version should upgrade to OpenSSL 3.0.5. OpenSSL 1.1.1 and 1.0.2 are not affected by this issue. This issue was reported to OpenSSL on 22nd June 2022 by Xi Ruoyao. The fix was developed by Xi Ruoyao. References ========== URL for this Security Advisory: https://www.openssl.org/news/secadv/20220705.txt Note: the online version of the advisory may be updated with additional details over time. For details of OpenSSL severity classifications please see: https://www.openssl.org/policies/secpolicy.html AES OCB fails to encrypt some bytes (CVE-2022-2097) =================================================== Severity: MODERATE AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. This issue affects versions 1.1.1 and 3.0. It was addressed in the releases of 1.1.1q and 3.0.5 on the 5th July 2022. OpenSSL 1.1.1 users should upgrade to 1.1.1q OpenSSL 3.0 users should upgrade to 3.0.5 This issue was reported to OpenSSL on the 15th June 2022 by Alex Chernyakhovsky from Google. The fix was developed by Alex Chernyakhovsky, David Benjamin and Alejandro Sedeņo from Google. -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEeVOsH7w9yLOykjk+1enkP3357owFAmLEEkUACgkQ1enkP335 7ozR5g/+Ofu4COpLp2VjRUuH268vwfaRCPgr9nbv3v9/KwW7FLzAWS/JqLqTmJiI GDP2TOM7jKSVh8oG8vnQ0c9DY1CULk28gaH6fp9jhfhvsblpva9Hdk74xYy3ebbR 5gLI++3WlROoGYf486R/t13X5vTLLJaun5R+3khf/i5+6SwDKrw4WM3UXNHLOxjM SFJ/hIPuVSFIHagZAzwcLMwOG+qa5JVU4i5TL9hio40Bl2gDKEkpDmj5UTWBT1Tu FZ66FMveM4sTlX3QrjWAQjAX2iq7S5Ng7PXWKsNYB4lckigG88jj2uC30oS+S8Bs /V10Yp9zlkfPAVZNo/qjy5ui+1KrZidF/deGPCs36ULbE2e9/aYFz6xfz0zfdkmr 8hgZBhMwJ+49woC45Vo67PPf7dHGvGh3OpPbApkeX0VtwPIElanf7uK8YQ/yCvYK +T8wKSDE/qcl9trTDZa567KTcv341LmxMFuVP5Ohxzfr+O1fKEPGCWepxOaP2GZY zx5MmLQmahcoYDInWr9iJD0OkySaJKWbEUM90oBHvjwY5+sW770LAX0nt8Uthb6J JPRyAeu6Un70u63GmXuPEvtuUGjYYnQsSke9/M2IgnE+1E+Hj5rfhCjWMQURUcvZ cC/hRphJ80ReuR8vEyBaN81tdr0/Dp6MUuvDnvkcYSzNHrgJL1o= =bJgr -----END PGP SIGNATURE----- --==_Exmh_1657035106_62160 Content-Type: text/plain; charset=us-ascii Cheers, Cy Schubert FreeBSD UNIX: Web: http://www.FreeBSD.org NTP: Web: https://nwtime.org e**(i*pi)+1=0 --==_Exmh_1657035106_62160--