摘要:
openssl security update
安全等级: Medium
公告ID: KylinSec-SA-2023-1637
发布日期: 2023年8月12日
关联CVE: CVE-2023-3817
OpenSSL is a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols.
Security Fix(es):
Issue summary: Checking excessively long DH keys or parameters may be very slow.
Impact summary: Applications that use the functions DH_check(), DH_check_ex()
or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long
delays. Where the key or parameters that are being checked have been obtained
from an untrusted source this may lead to a Denial of Service.
The function DH_check() performs various checks on DH parameters. After fixing
CVE-2023-3446 it was discovered that a large q parameter value can also trigger
an overly long computation during some of these checks. A correct q value,
if present, cannot be larger than the modulus p parameter, thus it is
unnecessary to perform these checks if q is larger than p.
An application that calls DH_check() and supplies a key or parameters obtained
from an untrusted source could be vulnerable to a Denial of Service attack.
The function DH_check() is itself called by a number of other OpenSSL functions.
An application calling any of those other functions may similarly be affected.
The other functions affected by this are DH_check_ex() and
EVP_PKEY_param_check().
Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications
when using the "-check" option.
The OpenSSL SSL/TLS implementation is not affected by this issue.
The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.(CVE-2023-3817)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2023-3817 | KY3.4-4A | openssl | Fixed |
CVE-2023-3817 | KY3.4-5A | openssl | Fixed |
CVE-2023-3817 | KY3.5.1 | openssl | Fixed |
CVE-2023-3817 | KY3.5.2 | openssl | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
openssl-help | noarch | 1.1.1m-22.kb1.ky3_5 |
openssl | x86_64 | 1.1.1m-22.kb1.ky3_5 |
openssl-devel | x86_64 | 1.1.1m-22.kb1.ky3_5 |
openssl-libs | x86_64 | 1.1.1m-22.kb1.ky3_5 |
openssl-perl | x86_64 | 1.1.1m-22.kb1.ky3_5 |
openssl | aarch64 | 1.1.1m-22.kb1.ky3_5 |
openssl-libs | aarch64 | 1.1.1m-22.kb1.ky3_5 |
openssl-perl | aarch64 | 1.1.1m-22.kb1.ky3_5 |
openssl-devel | aarch64 | 1.1.1m-22.kb1.ky3_5 |
软件名称 | 架构 | 版本号 |
---|---|---|
openssl-help | noarch | 1.1.1f-27.kb1.ky3_4 |
openssl | x86_64 | 1.1.1f-27.kb1.ky3_4 |
openssl-devel | x86_64 | 1.1.1f-27.kb1.ky3_4 |
openssl-libs | x86_64 | 1.1.1f-27.kb1.ky3_4 |
openssl-devel | aarch64 | 1.1.1f-27.kb1.ky3_4 |
openssl | aarch64 | 1.1.1f-27.kb1.ky3_4 |
openssl-libs | aarch64 | 1.1.1f-27.kb1.ky3_4 |
软件名称 | 架构 | 版本号 |
---|---|---|
openssl-help | noarch | 1.1.1f-27.kb1.ky3_4 |
openssl-devel | x86_64 | 1.1.1f-27.kb1.ky3_4 |
openssl | x86_64 | 1.1.1f-27.kb1.ky3_4 |
openssl-libs | x86_64 | 1.1.1f-27.kb1.ky3_4 |
openssl-libs | aarch64 | 1.1.1f-27.kb1.ky3_4 |
openssl | aarch64 | 1.1.1f-27.kb1.ky3_4 |
openssl-devel | aarch64 | 1.1.1f-27.kb1.ky3_4 |
软件名称 | 架构 | 版本号 |
---|---|---|
openssl-help | noarch | 1.1.1m-29.ky3_5.kb1 |
openssl-libs | x86_64 | 1.1.1m-29.ky3_5.kb1 |
openssl-perl | x86_64 | 1.1.1m-29.ky3_5.kb1 |
openssl-devel | x86_64 | 1.1.1m-29.ky3_5.kb1 |
openssl | x86_64 | 1.1.1m-29.ky3_5.kb1 |
openssl-libs | aarch64 | 1.1.1m-29.ky3_5.kb1 |
openssl-perl | aarch64 | 1.1.1m-29.ky3_5.kb1 |
openssl | aarch64 | 1.1.1m-29.ky3_5.kb1 |
openssl-devel | aarch64 | 1.1.1m-29.ky3_5.kb1 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名