LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 05-20-2024, 10:02 AM   #1
mfoley
Senior Member
 
Registered: Oct 2008
Location: Columbus, Ohio USA
Distribution: Slackware
Posts: 2,613

Rep: Reputation: 180Reputation: 180
Vulnerability in Slackware 15.0 openssl 1.1.1w


Our office subscribes to the Cybersecurity and Infrastructure Security Agency's "Web Application Scanning" report. They have been dinging us for a while with vulnerability issues in openssl 1.1.1w and are advising upgrading to 1.1.1x which fixes the problem. 1.1.1w is the latest available for Slackware 15.0.

Does anyone have any idea when 1.1.1x will be part of the standard release?

I see that Slackware-current has openssl 1.1.1x. Can I just download and install that package or will that mess up all kinds of things?

Thanks

Last edited by mfoley; 05-20-2024 at 10:03 AM.
 
Old 05-20-2024, 10:17 AM   #2
ponce
LQ Guru
 
Registered: Aug 2004
Location: Pisa, Italy
Distribution: Slackware
Posts: 7,130

Rep: Reputation: 4202Reputation: 4202Reputation: 4202Reputation: 4202Reputation: 4202Reputation: 4202Reputation: 4202Reputation: 4202Reputation: 4202Reputation: 4202Reputation: 4202
Slackware current provides openssl-1.1.1w, AFAIK there's no public 1.1.1x release.

I suggest to ask to these people who advise you to upgrade to the newer version where to get it.
 
Old 05-20-2024, 10:22 AM   #3
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,441

Rep: Reputation: 4191Reputation: 4191Reputation: 4191Reputation: 4191Reputation: 4191Reputation: 4191Reputation: 4191Reputation: 4191Reputation: 4191Reputation: 4191Reputation: 4191
version > 1.1.1w are only available with openssl premium support (US$50,000 annually)

https://www.openssl.org/support/cont...2377ab439bc0e8

Last edited by marav; 05-20-2024 at 10:25 AM.
 
Old 05-20-2024, 10:33 AM   #4
the3dfxdude
Member
 
Registered: May 2007
Posts: 737

Rep: Reputation: 363Reputation: 363Reputation: 363Reputation: 363
The git branch shows no checkins for 1.1.1x.
https://github.com/openssl/openssl/c..._1_1_1-stable/

Also, when 1.1.1w was released, the openssl team declared 1.1.1 EOL. I doubt there are anymore vulnerability fixes, as they will charge money for it.

Are they trying to get you to upgrade to version 3.x, and their message is just wrong?
 
Old 05-20-2024, 11:01 AM   #5
Petri Kaukasoina
Senior Member
 
Registered: Mar 2007
Posts: 1,938

Rep: Reputation: 1568Reputation: 1568Reputation: 1568Reputation: 1568Reputation: 1568Reputation: 1568Reputation: 1568Reputation: 1568Reputation: 1568Reputation: 1568Reputation: 1568
There is already 1.1.1y for paying customers.

According to https://www.openssl.org/news/vulnerabilities-1.1.1.html there are three issues in 1.1.1w:
  • CVE-2023-5678 Excessive time spent in DH check / generation with large Q parameter value [LOW severity] 06 November 2023
  • CVE-2024-0727 PKCS12 Decoding crashes [Low severity] 25 January 2024
  • CVE-2024-2511 Unbounded memory growth with session handling in TLSv1.3 [Low severity] 08 April 2024
 
1 members found this post helpful.
Old 05-20-2024, 12:40 PM   #6
mfoley
Senior Member
 
Registered: Oct 2008
Location: Columbus, Ohio USA
Distribution: Slackware
Posts: 2,613

Original Poster
Rep: Reputation: 180Reputation: 180
Quote:
Originally Posted by ponce View Post
Slackware current provides openssl-1.1.1w, AFAIK there's no public 1.1.1x release.

I suggest to ask to these people who advise you to upgrade to the newer version where to get it.
In slackware current there is https://mirrors.slackware.com/slackw...w-x86_64-1.txz (openssl-solibs-1.1.1w). I don't know if that would be sufficient, but there is no corresponding openssl 1.1.1w.
Quote:
Originally Posted by marav View Post
version > 1.1.1w are only available with openssl premium support (US$50,000 annually)

https://www.openssl.org/support/cont...2377ab439bc0e8
Ha ha ha ha ha! Right, I'm gonna fork over $50K.
Quote:
Originally Posted by the3dfxdude View Post
The git branch shows no checkins for 1.1.1x.
https://github.com/openssl/openssl/c..._1_1_1-stable/

Also, when 1.1.1w was released, the openssl team declared 1.1.1 EOL. I doubt there are anymore vulnerability fixes, as they will charge money for it.

Are they trying to get you to upgrade to version 3.x, and their message is just wrong?
They did say that versions 3.0.14, 3.1.6 and 3.2.2 don't have the vulnerability. Does anyone know if there will be a Linux/Slackware release of these versions any time soon?
Quote:
Originally Posted by Petri Kaukasoina View Post
There is already 1.1.1y for paying customers.
And to whom does one pay? If it's the same $50K as mentioned by ponce, I can't imagine why anyone would pay that, especially for low severity problems.
Quote:
According to https://www.openssl.org/news/vulnerabilities-1.1.1.html there are three issues in 1.1.1w:
  • CVE-2023-5678 Excessive time spent in DH check / generation with large Q parameter value [LOW severity] 06 November 2023
  • CVE-2024-0727 PKCS12 Decoding crashes [Low severity] 25 January 2024
  • CVE-2024-2511 Unbounded memory growth with session handling in TLSv1.3 [Low severity] 08 April 2024
So, these issues are all low severity. The worst consequence it seems is "excessive time" (CVE-2023-5678) or the system crashes (CVE-2024-0727, CVE-2024-2511). Nothing about infiltration or data exfiltration.

I don't see why this is a big deal.

As Linux is supposed to be a free distro, I would assume they'll be coming out with a new version of openssl one of these day, yes?

Last edited by mfoley; 05-20-2024 at 12:43 PM.
 
Old 05-21-2024, 07:49 AM   #7
the3dfxdude
Member
 
Registered: May 2007
Posts: 737

Rep: Reputation: 363Reputation: 363Reputation: 363Reputation: 363
Quote:
Originally Posted by mfoley View Post
Ha ha ha ha ha! Right, I'm gonna fork over $50K.
Indeed, the proposition seems ludicrous.

Reading the disclosures on the 3 vulnerability fixes at the link shared, I think most people would not be affected by those bugs. I think with some research, you can determine if you can keep using 1.1.1w and report back to your compliance people that you are not using a vulnerable configuration.

Quote:
Originally Posted by mfoley View Post
They did say that versions 3.0.14, 3.1.6 and 3.2.2 don't have the vulnerability. Does anyone know if there will be a Linux/Slackware release of these versions any time soon?
And to whom does one pay? If it's the same $50K as mentioned by ponce, I can't imagine why anyone would pay that, especially for low severity problems.
Slackware current has openssl 3.3.0. There's your other option if you want to upgrade. Or you might be able to backport it and recompile the applications you are using.
 
1 members found this post helpful.
Old 05-21-2024, 10:19 AM   #8
drmozes
Slackware Contributor
 
Registered: Apr 2008
Distribution: Slackware
Posts: 1,552

Rep: Reputation: 1314Reputation: 1314Reputation: 1314Reputation: 1314Reputation: 1314Reputation: 1314Reputation: 1314Reputation: 1314Reputation: 1314Reputation: 1314
Quote:
Originally Posted by mfoley View Post
And to whom does one pay? If it's the same $50K as mentioned by ponce, I can't imagine why anyone would pay that, especially for low severity problems.
There are plenty of vendors who use OpenSSL in their appliances who cannot easily upgrade them to a newer version of OpenSSL, as it requires lots of work. Such vendors take out the extended support contract to bridge the gap until those appliances can either be upgraded or they're EOL. Customers often pay vendors (RH, MS and I'm sure Canonical (Ubuntu) too) eye watering sums for the vendor to continue supporting an EOL OS or product because they cannot upgrade easily.
 
Old 05-23-2024, 03:21 PM   #9
bigbadaboum
Member
 
Registered: Apr 2023
Posts: 160

Rep: Reputation: 63
OpenSSL ________ eol
3.3 _____________ 10 Apr 2026
3.2 _____________ 23 Nov 2025
3.1 _____________ 14 Mar 2025
3.0 (LTS)_________ 07 Sep 2026

Quote:
mfoley
They did say that versions 3.0.14, 3.1.6 and 3.2.2 don't have the vulnerability. Does anyone know if there will be a Linux/Slackware release of these versions any time soon?
Well the Slackware team are incredible but the latest version of OpenSSL 3 is 3.0.13 But a little backport would be welcome (eudev-3.2.14 is a nightmare, without offense for eudev devs).

Last edited by bigbadaboum; 05-23-2024 at 03:44 PM.
 
Old 05-24-2024, 09:12 AM   #10
theodore.s
Member
 
Registered: Jul 2018
Location: Athens, Greece
Distribution: Slackware
Posts: 67

Rep: Reputation: 34
Nop.

Quote:
Originally Posted by bigbadaboum View Post
Well the Slackware team are incredible but the latest version of OpenSSL 3 is 3.0.13
No, it's not. The latest stable version is 3.2.1 and the latest non-stable is 3.3.0 (https://www.openssl.org/source/).
 
Old 05-24-2024, 09:53 AM   #11
BrunoLafleur
Member
 
Registered: Apr 2020
Location: France
Distribution: Slackware
Posts: 412

Rep: Reputation: 370Reputation: 370Reputation: 370Reputation: 370
Quote:
Originally Posted by theodore.s View Post
No, it's not. The latest stable version is 3.2.1 and the latest non-stable is 3.3.0 (https://www.openssl.org/source/).
The latest LTS version is the 3.0.13 mentionned above.
 
Old 05-26-2024, 12:40 AM   #12
bigbadaboum
Member
 
Registered: Apr 2023
Posts: 160

Rep: Reputation: 63
ntp-4.2.8p17
Quote:
from ntp_crypto.c:16:
/usr/include/openssl/rsa.h:282:5: note*: expected «*RSA * {alias struct rsa_st *}*» but argument is of type «*const struct rsa_st **»
int RSA_public_encrypt(int flen, const unsigned char *from, unsigned char *to,
^~~~~~~~~~~~~~~~~~
ntp_crypto.c: Dans la fonction «*crypto_alice*»:
ntp_crypto.c:2187:2: attention : «*EVP_PKEY_get0_DSA*» is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
if ((dsa = EVP_PKEY_get0_DSA(peer->ident_pkey->pkey)) == NULL) {
^~
ntp-4.2.8p18
"ntp-4.2.8p18 fixes somewhere between 2 and 3 dozen bugs."
SCaLE 21x Slides and Speaker Notes.pdf
Quote:
checking for openssl... /usr/bin/openssl
checking pkg-config for openssl... yes, version 3.0.13
configure: Searching for openssl/evp.h without -I
checking for openssl/evp.h... yes
checking If cc supports -Werror... yes
checking if we will link to ssl library... yes
checking for openssl/cmac.h... yes
 
Old 05-26-2024, 11:42 PM   #13
mfoley
Senior Member
 
Registered: Oct 2008
Location: Columbus, Ohio USA
Distribution: Slackware
Posts: 2,613

Original Poster
Rep: Reputation: 180Reputation: 180
I've snagged stuff from Slackware-current before and built on the "official" release. Sometimes it's worked, sometimes not. openssl seems like it would have it's tentacles in lots of other packages and I'm doubtful the attempt would be successful.

Since it's a decade-ish between new Slackware releases and openssl 1.1.1 is already at EOL, maybe the Slackware folks will come out with an openssl upgrade for 15.0 sooner rather than later.
 
  


Reply

Tags
openssl, slackware 15.0, vulnerability



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
How to update Security Vulnerability on Rhel Linux (CVE Vulnerability) taufikrizkir Linux - Security 2 05-18-2020 06:11 AM
vulnerability scanning using NMAP on CVE-2014-0322 vulnerability,check vulnerable meeiyoke Linux - Security 2 06-06-2014 05:09 PM
vulnerability scanning using NMAP on CVE-2014-0322 vulnerability,check vulnerable . meeiyoke Linux - Newbie 1 06-06-2014 12:14 PM
WARN: OpenSSL NULL Pointer Assignment vulnerability unSpawn Linux - Security 1 03-18-2004 12:11 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 10:38 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration