|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2023-3817: openssl: Excessive time spent checking DH q parameter value | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Robert Frohl <rfrohl> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | meissner, pmonrealgonzalez, stoyan.manolov |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/373803/ | ||
| Whiteboard: | CVSSv3.1:SUSE:CVE-2023-3817:5.3:(AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | ||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Robert Frohl
2023-08-01 09:24:53 UTC
Upstream added another related commit with tests for this change, here: * openssl 1.1.1v: https://github.com/openssl/openssl/commit/34d0f5cb * openssl 3.1.2: https://github.com/openssl/openssl/commit/1478ffad This change is not required but I have included it in the 1.1.1x versions. The tests are not included in the 3.1.x series as I found the commit after submitting 3.1.x. I can include them and re-submit if required. All affected codestreams were submitted: > Codestream Package Request > ----------------------------------------------------------------------------------- > openSUSE:Factory openssl (meta) https://build.opensuse.org/request/show/1101935 > SUSE:ALP:Source:Standard:1.0 openssl (meta) https://build.suse.de/request/show/304299 > ----------------------------------------------------------------------------------- > SUSE:ALP:Source:Standard:1.0 openssl-3 https://build.suse.de/request/show/304298 > SUSE:SLE-15-SP5:Update openssl-3 https://build.suse.de/request/show/304289 > SUSE:SLE-15-SP4:Update openssl-3 https://build.suse.de/request/show/304290 > openSUSE:Factory openssl-3 https://build.opensuse.org/request/show/1101934 > ----------------------------------------------------------------------------------- > SUSE:ALP:Source:Standard:1.0 openssl-1_1 https://build.suse.de/request/show/304301 > SUSE:SLE-15-SP5:Update openssl-1_1 https://build.suse.de/request/show/304337 > SUSE:SLE-15-SP4:Update openssl-1_1 https://build.suse.de/request/show/304339 > SUSE:SLE-15-SP2:Update openssl-1_1 https://build.suse.de/request/show/304544 > SUSE:SLE-15-SP1:Update openssl-1_1 https://build.suse.de/request/show/304343 > SUSE:SLE-12-SP4:Update openssl-1_1 https://build.suse.de/request/show/304344 > openSUSE:Factory openssl-1_1 https://build.opensuse.org/request/show/1101937 > ----------------------------------------------------------------------------------- > SUSE:SLE-15:Update openssl-1_0_0 https://build.suse.de/request/show/305001 > SUSE:SLE-12-SP4:Update openssl-1_0_0 https://build.suse.de/request/show/305002 > SUSE:SLE-12-SP2:Update openssl https://build.suse.de/request/show/305003 > SUSE:SLE-11-SP3:Update openssl1 not affected > openSUSE:Factory openssl-1_0_0 https://build.opensuse.org/request/show/1102939 > ----------------------------------------------------------------------------------- > SUSE:SLE-12:Update compat-openssl098 not affected > SUSE:SLE-11-SP1:Update openssl not affected OpenSSL 1.0.1 and older are not affected. Additional checks (especially g^q == 1 mod p) that might trigger an overly long computation were introduced in 2011 by commit 07981709667191ae61595a6f40530ccc4e41386f. (In reply to Pedro Monreal Gonzalez from comment #5) > Upstream added another related commit with tests for this change, here: > * openssl 1.1.1v: https://github.com/openssl/openssl/commit/34d0f5cb > * openssl 3.1.2: https://github.com/openssl/openssl/commit/1478ffad > > This change is not required but I have included it in the 1.1.1x versions. > The tests are not included in the 3.1.x series as I found the commit after > submitting 3.1.x. I can include them and re-submit if required. I added tests into our Devel project so it will be submitted with next CVE. Assigning back to security team. SUSE-SU-2023:3244-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1213853 CVE References: CVE-2023-3817 Sources used: openSUSE Leap 15.4 (src): openssl-3-3.0.8-150400.4.34.1 Basesystem Module 15-SP4 (src): openssl-3-3.0.8-150400.4.34.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3243-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1213853 CVE References: CVE-2023-3817 Sources used: openSUSE Leap 15.5 (src): openssl-3-3.0.8-150500.5.11.1 Basesystem Module 15-SP5 (src): openssl-3-3.0.8-150500.5.11.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3242-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1213853 CVE References: CVE-2023-3817 Sources used: openSUSE Leap 15.5 (src): openssl-1_1-1.1.1l-150500.17.15.1 Basesystem Module 15-SP5 (src): openssl-1_1-1.1.1l-150500.17.15.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3239-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1213853 CVE References: CVE-2023-3817 Sources used: SUSE Linux Enterprise Software Development Kit 12 SP5 (src): openssl-1_1-1.1.1d-2.98.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): openssl-1_1-1.1.1d-2.98.1 SUSE Linux Enterprise Server 12 SP5 (src): openssl-1_1-1.1.1d-2.98.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): openssl-1_1-1.1.1d-2.98.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3291-1: An update that solves one vulnerability and has one fix can now be installed. Category: security (moderate) Bug References: 1213517, 1213853 CVE References: CVE-2023-3817 Sources used: SUSE Manager Proxy 4.2 (src): openssl-1_1-1.1.1d-150200.11.75.1 SUSE Manager Retail Branch Server 4.2 (src): openssl-1_1-1.1.1d-150200.11.75.1 SUSE Manager Server 4.2 (src): openssl-1_1-1.1.1d-150200.11.75.1 SUSE Linux Enterprise Micro 5.1 (src): openssl-1_1-1.1.1d-150200.11.75.1 SUSE Linux Enterprise Micro 5.2 (src): openssl-1_1-1.1.1d-150200.11.75.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): openssl-1_1-1.1.1d-150200.11.75.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3308-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1213853 CVE References: CVE-2023-3817 Sources used: SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (src): openssl-1.0.2j-60.104.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3339-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1213853 CVE References: CVE-2023-3817 Sources used: SUSE Linux Enterprise Software Development Kit 12 SP5 (src): openssl-1_0_0-1.0.2p-3.84.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): openssl-1_0_0-1.0.2p-3.84.1 SUSE Linux Enterprise Server 12 SP5 (src): openssl-1_0_0-1.0.2p-3.84.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): openssl-1_0_0-1.0.2p-3.84.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3338-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1213853 CVE References: CVE-2023-3817 Sources used: openSUSE Leap 15.4 (src): openssl-1_0_0-1.0.2p-150000.3.85.1 openSUSE Leap 15.5 (src): openssl-1_0_0-1.0.2p-150000.3.85.1 Legacy Module 15-SP4 (src): openssl-1_0_0-1.0.2p-150000.3.85.1 Legacy Module 15-SP5 (src): openssl-1_0_0-1.0.2p-150000.3.85.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3244-2: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1213853 CVE References: CVE-2023-3817 Sources used: openSUSE Leap Micro 5.4 (src): openssl-3-3.0.8-150400.4.34.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): openssl-3-3.0.8-150400.4.34.1 SUSE Linux Enterprise Micro 5.3 (src): openssl-3-3.0.8-150400.4.34.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): openssl-3-3.0.8-150400.4.34.1 SUSE Linux Enterprise Micro 5.4 (src): openssl-3-3.0.8-150400.4.34.1 openSUSE Leap Micro 5.3 (src): openssl-3-3.0.8-150400.4.34.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3397-1: An update that solves one vulnerability and has one fix can now be installed. Category: security (moderate) Bug References: 1213517, 1213853 CVE References: CVE-2023-3817 Sources used: openSUSE Leap 15.4 (src): openssl-1_1-1.1.1l-150400.7.53.1 openSUSE Leap Micro 5.3 (src): openssl-1_1-1.1.1l-150400.7.53.1 openSUSE Leap Micro 5.4 (src): openssl-1_1-1.1.1l-150400.7.53.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): openssl-1_1-1.1.1l-150400.7.53.1 SUSE Linux Enterprise Micro 5.3 (src): openssl-1_1-1.1.1l-150400.7.53.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): openssl-1_1-1.1.1l-150400.7.53.1 SUSE Linux Enterprise Micro 5.4 (src): openssl-1_1-1.1.1l-150400.7.53.1 Basesystem Module 15-SP4 (src): openssl-1_1-1.1.1l-150400.7.53.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3958-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1213853 CVE References: CVE-2023-3817 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): openssl-1_1-1.1.0i-150100.14.65.6 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): openssl-1_1-1.1.0i-150100.14.65.6 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): openssl-1_1-1.1.0i-150100.14.65.6 SUSE CaaS Platform 4.0 (src): openssl-1_1-1.1.0i-150100.14.65.6 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3291-2: An update that solves one vulnerability and has one security fix can now be installed. Category: security (moderate) Bug References: 1213517, 1213853 CVE References: CVE-2023-3817 Sources used: SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): openssl-1_1-1.1.1d-150200.11.75.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): openssl-1_1-1.1.1d-150200.11.75.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): openssl-1_1-1.1.1d-150200.11.75.1 SUSE Enterprise Storage 7.1 (src): openssl-1_1-1.1.1d-150200.11.75.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): openssl-1_1-1.1.1d-150200.11.75.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): openssl-1_1-1.1.1d-150200.11.75.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): openssl-1_1-1.1.1d-150200.11.75.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): openssl-1_1-1.1.1d-150200.11.75.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:4190-1: An update that solves two vulnerabilities can now be installed. Category: security (important) Bug References: 1213853, 1216163 CVE References: CVE-2023-3817, CVE-2023-5363 Sources used: openSUSE Leap 15.5 (src): openssl-3-3.0.8-150500.5.14.1 Basesystem Module 15-SP5 (src): openssl-3-3.0.8-150500.5.14.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:4189-1: An update that solves two vulnerabilities can now be installed. Category: security (important) Bug References: 1213853, 1216163 CVE References: CVE-2023-3817, CVE-2023-5363 Sources used: openSUSE Leap 15.4 (src): openssl-3-3.0.8-150400.4.37.1 openSUSE Leap Micro 5.3 (src): openssl-3-3.0.8-150400.4.37.1 openSUSE Leap Micro 5.4 (src): openssl-3-3.0.8-150400.4.37.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): openssl-3-3.0.8-150400.4.37.1 SUSE Linux Enterprise Micro 5.3 (src): openssl-3-3.0.8-150400.4.37.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): openssl-3-3.0.8-150400.4.37.1 SUSE Linux Enterprise Micro 5.4 (src): openssl-3-3.0.8-150400.4.37.1 Basesystem Module 15-SP4 (src): openssl-3-3.0.8-150400.4.37.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. |