Moderate: openssl security and bug fix update

Synopsis

Moderate: openssl security and bug fix update

Type/Severity

Security Advisory: Moderate

Topic

An update for openssl is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.

Security Fix(es):

  • openssl: side-channel weak encryption vulnerability (CVE-2019-1547)
  • openssl: information disclosure in fork() (CVE-2019-1549)
  • openssl: information disclosure in PKCS7_dataDecode and CMS_decrypt_set1_pkey (CVE-2019-1563)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for ARM 64 8 aarch64

Fixes

  • BZ - 1735738 - openssl speed reports errors in FIPS mode
  • BZ - 1741285 - TLS 1.2 CCM ciphers are not recognised in FIPS mode
  • BZ - 1741317 - 1024 bit DSA key generation is not disabled in FIPS mode
  • BZ - 1741641 - OpenSSL will sign ServerKeyExchange message with SHA-1 in FIPS mode
  • BZ - 1749068 - OpenSSL generates malformed status_request extension in CertificateRequest message in TLS 1.3
  • BZ - 1749790 - OpenSSL advertises ed25519 and ed448 support in CertificateRequest in FIPS mode
  • BZ - 1752090 - CVE-2019-1547 openssl: side-channel weak encryption vulnerability
  • BZ - 1752095 - CVE-2019-1549 openssl: information disclosure in fork()
  • BZ - 1752100 - CVE-2019-1563 openssl: information disclosure in PKCS7_dataDecode and CMS_decrypt_set1_pkey
  • BZ - 1758587 - OpenSSL will send unexpected alert for too short ciphertext with specific ciphersuites [rhel-8]
  • BZ - 1793984 - [RHEL 8][s390x] Restore modified SIGILL signal handler during libcrypto library initialisation

CVEs

References