Type: | BUG |
Impact: | NA |
Release Date: | 2025-06-09 |
[20250214-1.gitfd9b9b9]
- openssl: use both names for P384-MLKEM1024
[20250128-1.git22421d3]
- openssl: stricter enabling of Ciphersuites
- openssl: make use of -CBC and -AESGCM keywords
[20241128-1.git0dd441c]
- openssl: add TLS 1.3 Brainpool identifiers
[20241126-1.gitd63f008]
- alg_lists: mark MLKEM768 kex experimental
- openssh, libssh: refactor kx maps to use tuples
- openssh: map mlkem768x25519-sha256 to KEM-ECDH & MLKEM768-X25519 & SHA2-256
- update-crypto-policies: skip warning on --set=FIPS if bootc
- update-crypto-policies: don't output FIPS warning in fips mode
[20241106-2.git7073416]
- fips-mode-setup: Remove
Resolves: RHEL-65652
[20241106-1.git1bdaba3]
- gnutls: add GROUP-X25519-MLKEM768 and GROUP-SECP256R1-MLKEM768
- nss: add mlkem768x25519 and mlkem768secp256r1
[20241105-1.git978ac26]
- gnutls: allow-rsa-pkcs1-encrypt = false everywhere but in LEGACY
[20241104-1.git6a67b8c]
- openssl: use both names for SecP256r1MLKEM768 / X25519MLKEM768
[20241021-2.gitd5393d5]
- Bump release for October 2024 mass rebuild:
Resolves: RHEL-64018
[20241021-1.gitd5393d5]
- TEST-PQ, openssh: add support for mlkem768x25519-sha256 key_exchange
- openssh: remove sntrup761x25519-sha512@openssh.com key_exchange
[20241010-1.git7a71364]
- reintroduce TEST-PQ (ML-DSA/ML-KEM) in a crypto-policies-pq-preview subpackage
- LEGACY: enable 192-bit ciphers for nss pkcs12/smime
- LEGACY: drop cipher@pkcs12 = SEED-CBC
- fips-mode-setup: tolerate fips dracut module presence w/o FIPS
- nss: be stricter with new purposes
[20240828-1.gitd249111]
- fips-mode-setup: small Argon2 detection fix
[20240822-1.git367040b]
- fips-mode-setup: block if LUKS devices using Argon2 are detected
[20240807-1.git7ea320f]
- fips-crypto-policy-overlay: a unit to automount FIPS policy when fips=1
- fips-setup-helper: add a libexec helper for anaconda
- fips-mode-setup: force --no-bootcfg when UKI is detected
[20240802-1.git8cb6f2d]
- nss: rewrite backend for nss 3.101
[20240725-1.git3de485c]
- nss: wire KYBER768 to X25519-XYBER768D00
- java: start controlling / disable DTLSv1.0
- java: disable anon ciphersuites, tying them to NULL
- java: respect more key size restrictions
- java: specify jdk.tls.namedGroups system property
- java: make hash, mac and sign more orthogonal
- fips-mode-setup: add another scary 'unsupported'
- fips-mode-setup: flashy ticking warning upon use
- java: use and include jdk.disabled.namedCurves
- ec_min_size: introduce and use in java, default to 256
- java: stop specifying jdk.tls.namedGroups in javasystem
- java: drop unused javasystem backend
- openssh: make dss no longer enableble, support is dropped
- LEGACY: disable sign = *-SHA1
- DEFAULT: disable RSA key exchange
- nss: TLS-REQUIRE-EMS in FIPS
[20240522-2.git77963ab]
- Bump release for June 2024 mass rebuild
[20240522-1.git77963ab]
- Switch to a version based on Fedora 41 crypto-policies
(20240521-1.gitf71d135.fc41),
thus replace the changelog below with Fedora changelog
- Shape up RHEL-10: remove GOST-ONLY policy and GOST subpolicy
- Shape up RHEL-10: remove NEXT policy
- Shape up RHEL-10: remove BSI policy
- Shape up RHEL-10: remove TEST-FEDORA41 policy
- Shape up RHEL-10: remove NO-SHA1 subpolicy
- Shape up RHEL-10: remove SHA1 subpolicy
- Shape up RHEL-10: remove TEST-PQ policy
- Shape up RHEL-10: disable CAMELLIA in all policies...
- Shape up RHEL-10: drop FFDHE-1024 from LEGACY
- Shape up RHEL-10: DEFAULT: remove Fedora-only DSA-SHA1 RPM enablement
- Shape up RHEL-10: remove Fedora-specific __openssl_block_sha1_signatures...
- Shape up RHEL-10: disable 3DES in LEGACY
- Shape up RHEL-10: disable DSA
- Shape up RHEL-10: mark LEGACY as 80-bit security (@tomato42)
- Shape up RHEL-10: require TLSv1.2/DTLSv1.2 in all policies
- Shape up RHEL-10: requre 2048 bit params in LEGACY
- Shape up RHEL-10: FUTURE: disable CBC ciphers for all but krb5
- Shape up RHEL-10: disable DHE-DSS even in LEGACY
- Shape up RHEL-10: gnutls: explicit ECDSA-SECPNNNR1-SHANNN + reorder
- Shape up RHEL-10: openssh: disable DHE-FFDHE-1024-SHA1 server config hack
- Shape up RHEL-10: FIPS: disable SHA-1 HMAC in FIPS policy
- Shape up RHEL-10: FIPS: disable CBC ciphers except in Kerberos
- Shape up RHEL-10: policies/modules: update AD-SUPPORT away from RC4/MD5
- Shape up RHEL-10: drop DNSSEC SHA-1 exception from DEFAULT
[20240521-1.gitf71d135]
- nss: unconditionally include p11-kit-proxy
- TEST-PQ: update algorithm list, mark all PQ algorithms experimental
[20240515-1.gita24a14b]
- gnutls: use tls-session-hash option, enforcing EMS in FIPS mode
- gnutls: DTLS 0.9 is controllable again
- gnutls: remove extraneous newline
- openssh: remove support for old names of RequiredRSASize
[20240320-1.git58e3d95]
- modules/FEDORA32, FEDORA38, TEST-FEDORA39: drop
- openssl: mark liboqsprovider groups optional with ?
- TEST-PQ: add more group and sign values, marked experimental
- TEST-FEDORA41: add a new policy with __openssl_block_sha1_signatures = 1
- TEST-PQ: also enable sntrup761x25519-sha512@openssh.com
[20240304-1.git0375239]
- packaging: remove perl build-dependency, it's not needed anymore
- packaging: stop linting at check-time, relying on upstream CI instead
- packaging: drop stale workarounds
- libreswan: do not use up pfs= / ikev2= keywords for default behaviour
[20240201-2.git9f501f3]
- Rebuilt for java-21-openjdk as system jdk
[20240201-1.git9f501f3]
- fips-finish-install: make sure ostree is detected in chroot
- fips-mode-setup: make sure ostree is detected in chroot
- java: disable ChaCha20-Poly1305 where applicable
[20231204-3.git1e3a2e4]
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
[20231204-2.git1e3a2e4]
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
[20231204-1.git1e3a2e4]
- TEST-PQ: add a subpolicy to test post-quantum algorithms. Do not rely on.
[20231113-1.gitb402e82]
- fips-mode-setup: Write error messages to stderr
- fips-mode-setup: Fix some shellcheck warnings
- fips-mode-setup: Fix test for empty /boot
- fips-mode-setup: Avoid 'boot=UUID=' if /boot == /
[20231109-1.gitadb5572]
- Restore support for scoped ssh_etm directives
- Print matches in syntax deprecation warnings
[20231107-1.gitd5877b3]
- fips-mode-setup: Fix usage with --no-bootcfg
[20231107-1.git8f49dfa]
- turn ssh_etm into an etm@SSH tri-state
- fips-mode-setup: increase chroot-friendliness (rhbz#2164847)
[20230920-1.git570ea89]
- OSPP subpolicy: tighten beyond reason for OSPP 4.3
- fips-mode-setup: more thorough --disable, still unsupported
[20230731-1.git5ed06e0]
- BSI: start a BSI TR 02102 policy
- krb5: sort enctypes mac-first, cipher-second, prioritize SHA-2 ones
- FIPS: enforce EMS in FIPS mode
- NO-ENFORCE-EMS: add subpolicy to undo the EMS enforcement in FIPS mode
- nss: implement EMS enforcement in FIPS mode (not enabled yet)
- openssl: implement EMS enforcement in FIPS mode
- gnutls: implement EMS enforcement in FIPS mode (not enabled yet)
- docs: replace FIPS 140-2 with just FIPS 140
[20230614-2.git5f3458e]
- Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild
[20230614-1.git5f3458e]
- policies: restore group order to old OpenSSL default order
[20230420-1.git3d08ae7]
- openssl: specify Groups explicitly
- openssl: add support for Brainpool curves
[20230301-1.git2ea6d2a]
- rpm-sequoia: add separate rpm-sequoia backend
- DEFAULT: allow SHA-1 and 1024 bit DSA in RPM (https://pagure.io/fesco/issue/2960)
[20230220-1.git8c7de04]
- Makefile: support asciidoc 10
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team