Bug 30619 - openssl new security issue CVE-2022-2097
Summary: openssl new security issue CVE-2022-2097
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 8
Hardware: i586 Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA8-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2022-07-08 20:39 CEST by David Walser
Modified: 2022-07-12 10:33 CEST (History)
8 users (show)

See Also:
Source RPM: openssl-1.1.1p-1.mga8.src.rpm
CVE: CVE-2022-2097
Status comment:


Attachments

Description David Walser 2022-07-08 20:39:03 CEST
OpenSSL has issued an advisory on July 5:
https://www.openssl.org/news/secadv/20220705.txt

The issue is fixed upstream in 1.1.1q (and 3.0.5, already in Cauldron).

Ubuntu has issued an advisory for this on July 5:
https://ubuntu.com/security/notices/USN-5502-1
David Walser 2022-07-08 20:39:12 CEST

Status comment: (none) => Fixed upstream in 1.1.1q

Comment 1 Marja Van Waes 2022-07-10 16:58:04 CEST
Assigning to the basesystem maintainers because:

$ urpmq --requires-recursive basesystem-minimal | grep openssl
lib64openssl3

CC'ing ns80 and two more who pushed this package in 2021 and/or 2022

Assignee: bugsquad => basesystem
CC: (none) => guillomovitch, mageia, marja11, nicolas.salguero

Comment 2 Nicolas Salguero 2022-07-11 10:01:07 CEST
Suggested advisory:
========================

The updated packages fix a security vulnerability:

AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. (CVE-2022-2097)

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097
https://www.openssl.org/news/secadv/20220705.txt
https://ubuntu.com/security/notices/USN-5502-1
========================

Updated packages in core/updates_testing:
========================
lib(64)openssl1.1-1.1.1q-1.mga8
lib(64)openssl-devel-1.1.1q-1.mga8
lib(64)openssl-static-devel-1.1.1q-1.mga8
openssl-1.1.1q-1.mga8
openssl-perl-1.1.1q-1.mga8

from SRPM:
openssl-1.1.1q-1.mga8.src.rpm

Status comment: Fixed upstream in 1.1.1q => (none)
Status: NEW => ASSIGNED
Assignee: basesystem => qa-bugs
CVE: (none) => CVE-2022-2097

Comment 3 Herman Viaene 2022-07-11 15:24:10 CEST
MGA8-64 Plasma on Acer Aspire 5253
No installation issues
Following wiki and bug 30573
$ openssl version -a
OpenSSL 1.1.1q  5 Jul 2022
built on: Mon Jul 11 07:24:34 2022 UTC
platform: linux-x86_64
options:  bn(64,64) md2(char) rc4(8x,int) des(int) idea(int) blowfish(ptr) 
compiler: gcc -fPIC -pthread -m64 -Wa,--noexecstack -O2 -g -pipe -Wformat -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fstack-protector --param=ssp-buffer-size=4 -fstack-protector-all -fasynchronous-unwind-tables -O2 -g -pipe -Wformat -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fstack-protector --param=ssp-buffer-size=4 -fstack-protector-all -fasynchronous-unwind-tables -Wa,--noexecstack -Wa,--generate-missing-build-notes=yes -DOPENSSL_USE_NODELETE -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM -DZLIB -DNDEBUG -DPURIFY -DDEVRANDOM="\"/dev/urandom\"" -DSYSTEM_CIPHERS_FILE="/etc/crypto-policies/back-ends/openssl.config"
OPENSSLDIR: "/etc/pki/tls"
ENGINESDIR: "/usr/lib64/engines-1.1"
Seeding source: os-specific
engines:  dynamic 

$ openssl ciphers -v
TLS_AES_256_GCM_SHA384  TLSv1.3 Kx=any      Au=any  Enc=AESGCM(256) Mac=AEAD
TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any      Au=any  Enc=CHACHA20/POLY1305(256) Mac=AEAD
TLS_AES_128_GCM_SHA256  TLSv1.3 Kx=any      Au=any  Enc=AESGCM(128) Mac=AEAD
TLS_AES_128_CCM_SHA256  TLSv1.3 Kx=any      Au=any  Enc=AESCCM(128) Mac=AEAD
ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AESGCM(256) Mac=AEAD
ECDHE-ECDSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
ECDHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH     Au=RSA  Enc=CHACHA20/POLY1305(256) Mac=AEAD
ECDHE-ECDSA-AES256-CCM  TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESCCM(256) Mac=AEAD
etc ....

$ openssl ciphers -v -tls1
TLS_AES_256_GCM_SHA384  TLSv1.3 Kx=any      Au=any  Enc=AESGCM(256) Mac=AEAD
TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any      Au=any  Enc=CHACHA20/POLY1305(256) Mac=AEAD
TLS_AES_128_GCM_SHA256  TLSv1.3 Kx=any      Au=any  Enc=AESGCM(128) Mac=AEAD
TLS_AES_128_CCM_SHA256  TLSv1.3 Kx=any      Au=any  Enc=AESCCM(128) Mac=AEAD
ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AESGCM(256) Mac=AEAD
ECDHE-ECDSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
etc....

$ openssl ciphers -v 'HIGH'
TLS_AES_256_GCM_SHA384  TLSv1.3 Kx=any      Au=any  Enc=AESGCM(256) Mac=AEAD
TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any      Au=any  Enc=CHACHA20/POLY1305(256) Mac=AEAD
TLS_AES_128_GCM_SHA256  TLSv1.3 Kx=any      Au=any  Enc=AESGCM(128) Mac=AEAD
TLS_AES_128_CCM_SHA256  TLSv1.3 Kx=any      Au=any  Enc=AESCCM(128) Mac=AEAD
ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESGCM(256) Mac=AEAD
and a looooong list

$ openssl ciphers -v 'AES+HIGH'
TLS_AES_256_GCM_SHA384  TLSv1.3 Kx=any      Au=any  Enc=AESGCM(256) Mac=AEAD
TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any      Au=any  Enc=CHACHA20/POLY1305(256) Mac=AEAD
TLS_AES_128_GCM_SHA256  TLSv1.3 Kx=any      Au=any  Enc=AESGCM(128) Mac=AEAD
TLS_AES_128_CCM_SHA256  TLSv1.3 Kx=any      Au=any  Enc=AESCCM(128) Mac=AEAD
ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AESGCM(256) Mac=AEAD
idem.....

Continuing in a moment

CC: (none) => herman.viaene

Comment 4 Herman Viaene 2022-07-11 15:50:09 CEST
$ openssl speed
Doing md2 for 3s on 16 size blocks: 194982 md2's in 2.98s
Doing md2 for 3s on 64 size blocks: 101807 md2's in 2.98s
Doing md2 for 3s on 256 size blocks: 34859 md2's in 2.99s
Doing md2 for 3s on 1024 size blocks: 9000 md2's in 2.81s
took a nap while this was running, boringly long....

$ openssl s_time -connect <desktop>:443
Collecting connection statistics for 30 seconds
*****
1961 connections in 8.06s; 243.30 connections/user sec, bytes read 0
1961 connections in 31 real seconds, 0 bytes read per connection
Now timing with session id reuse.
starting
*******
989 connections in 7.93s; 250.82 connections/user sec, bytes read 0
1989 connections in 31 real seconds, 0 bytes read per connection

All looks OK

Whiteboard: (none) => MGA8-64-OK

Comment 5 Thomas Andrews 2022-07-12 02:32:13 CEST
Validating. Advisory in Comment 2.

Keywords: (none) => validated_update
CC: (none) => andrewsfarm, sysadmin-bugs

Dave Hodgins 2022-07-12 02:46:32 CEST

CC: (none) => davidwhodgins
Keywords: (none) => advisory

Comment 6 Mageia Robot 2022-07-12 10:33:51 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2022-0255.html

Resolution: (none) => FIXED
Status: ASSIGNED => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.