Bug 1204226 (CVE-2022-3358) - VUL-0: CVE-2022-3358: openssl-3: possible no encryption when custom cipher setup
Summary: VUL-0: CVE-2022-3358: openssl-3: possible no encryption when custom cipher setup
Status: RESOLVED FIXED
Alias: CVE-2022-3358
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/344658/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-3358:6.5:(AV:N...
Keywords:
Depends on:
Blocks:
 
Reported: 2022-10-12 07:03 UTC by Alexander Bergmann
Modified: 2024-04-19 14:28 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2022-10-12 07:03:43 UTC
CVE-2022-3358

OpenSSL supports creating a custom cipher via the legacy EVP_CIPHER_meth_new()
function and associated function calls. This function was deprecated in OpenSSL
3.0 and application authors are instead encouraged to use the new provider
mechanism in order to implement custom ciphers. OpenSSL versions 3.0.0 to 3.0.5
incorrectly handle legacy custom ciphers passed to the EVP_EncryptInit_ex2(),
EVP_DecryptInit_ex2() and EVP_CipherInit_ex2() functions (as well as other
similarly named encryption and decryption initialisation functions). Instead of
using the custom cipher directly it incorrectly tries to fetch an equivalent
cipher from the available providers. An equivalent cipher is found based on the
NID passed to EVP_CIPHER_meth_new(). This NID is supposed to represent the
unique NID for a given cipher. However it is possible for an application to
incorrectly pass NID_undef as this value in the call to EVP_CIPHER_meth_new().
When NID_undef is used in this way the OpenSSL encryption/decryption
initialisation function will match the NULL cipher as being equivalent and will
fetch this from the available providers. This will succeed if the default
provider has been loaded (or if a third party provider has been loaded that
offers this cipher). Using the NULL cipher means that the plaintext is emitted
as the ciphertext. Applications are only affected by this issue if they call
EVP_CIPHER_meth_new() using NID_undef and subsequently use it in a call to an
encryption/decryption initialisation function. Applications that only use
SSL/TLS are not impacted by this issue. 

Fixed in OpenSSL 3.0.6 (Affected 3.0.0-3.0.5).


References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3358
https://www.cve.org/CVERecord?id=CVE-2022-3358
https://www.openssl.org/news/secadv/20221011.txt
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=5485c56679d7c49b96e8fc8ca708b0b7e7c03c4b
Comment 1 Jason Sikes 2022-10-14 00:15:06 UTC
created request id 282308 for SLE-15-SP4.

Fix for Factory will be a part of openssl-3.0.6 update.

Unfortunately, Upstream has withdrawn their openssl-3.0.6 release. I believe we can wait until they re-release it.
Comment 6 Swamp Workflow Management 2022-11-01 20:18:25 UTC
SUSE-SU-2022:3843-1: An update that fixes three vulnerabilities is now available.

Category: security (critical)
Bug References: 1204226,1204714
CVE References: CVE-2022-3358,CVE-2022-3602,CVE-2022-3786
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    openssl-3-3.0.1-150400.4.11.1
SUSE Linux Enterprise Module for Basesystem 15-SP4 (src):    openssl-3-3.0.1-150400.4.11.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Pedro Monreal Gonzalez 2022-11-02 11:33:45 UTC
Factory submission: https://build.opensuse.org/request/show/1032748
Comment 8 Otto Hollmann 2022-11-11 10:15:25 UTC
Assigning back to security team, all affected code streams were fixed:

Codestream             Request
--------------------------------------------------------------
SUSE:SLE-15-SP4:Update https://build.suse.de/request/show/282308
openSUSE:Factory       https://build.opensuse.org/request/show/1032748
Comment 11 Robert Frohl 2024-04-19 14:28:09 UTC
done