Type: | SECURITY |
Impact: | LOW |
Release Date: | 2023-05-15 |
[3.0.7-6.0.1]
- Replace upstream references [Orabug: 34340177]
[1:3.0.7-6]
- Fixes RNG slowdown in FIPS mode
Resolves: rhbz#2168224
[1:3.0.7-5]
- Fixed X.509 Name Constraints Read Buffer Overflow
Resolves: CVE-2022-4203
- Fixed Timing Oracle in RSA Decryption
Resolves: CVE-2022-4304
- Fixed Double free after calling PEM_read_bio_ex
Resolves: CVE-2022-4450
- Fixed Use-after-free following BIO_new_NDEF
Resolves: CVE-2023-0215
- Fixed Invalid pointer dereference in d2i_PKCS7 functions
Resolves: CVE-2023-0216
- Fixed NULL dereference validating DSA public key
Resolves: CVE-2023-0217
- Fixed X.400 address type confusion in X.509 GeneralName
Resolves: CVE-2023-0286
- Fixed NULL dereference during PKCS7 data verification
Resolves: CVE-2023-0401
[1:3.0.7-4]
- Disallow SHAKE in RSA-OAEP decryption in FIPS mode
Resolves: rhbz#2142121
[1:3.0.7-3]
- Refactor OpenSSL fips module MAC verification
Resolves: rhbz#2157965
[1:3.0.7-2]
- Various provider-related imrovements necessary for PKCS#11 provider correct operations
Resolves: rhbz#2142517
- We should export 2 versions of OPENSSL_str[n]casecmp to be compatible with upstream
Resolves: rhbz#2133809
- Removed recommended package for openssl-libs
Resolves: rhbz#2093804
- Adjusting include for the FIPS_mode macro
Resolves: rhbz#2083879
- Backport of ppc64le Montgomery multiply enhancement
Resolves: rhbz#2130708
- Fix explicit indicator for PSS salt length in FIPS mode when used with
negative magic values
Resolves: rhbz#2142087
- Update change to default PSS salt length with patch state from upstream
Related: rhbz#2142087
[1:3.0.7-1]
- Rebasing to OpenSSL 3.0.7
Resolves: rhbz#2129063
[1:3.0.1-44]
- SHAKE-128/256 are not allowed with RSA in FIPS mode
Resolves: rhbz#2144010
- Avoid memory leaks in TLS
Resolves: rhbz#2144008
- FIPS RSA CRT tests must use correct parameters
Resolves: rhbz#2144006
- FIPS-140-3 permits only SHA1, SHA256, and SHA512 for DRBG-HASH/DRBG-HMAC
Resolves: rhbz#2144017
- Remove support for X9.31 signature padding in FIPS mode
Resolves: rhbz#2144015
- Add explicit indicator for SP 800-108 KDFs with short key lengths
Resolves: rhbz#2144019
- Add explicit indicator for HMAC with short key lengths
Resolves: rhbz#2144000
- Set minimum password length for PBKDF2 in FIPS mode
Resolves: rhbz#2144003
- Add explicit indicator for PSS salt length in FIPS mode
Resolves: rhbz#2144012
- Clamp default PSS salt length to digest size for FIPS 186-4 compliance
Related: rhbz#2144012
- Forbid short RSA keys for key encapsulation/decapsulation in FIPS mode
Resolves: rhbz#2145170
[1:3.0.1-43]
- CVE-2022-3602: X.509 Email Address Buffer Overflow
- CVE-2022-3786: X.509 Email Address Buffer Overflow
Resolves: CVE-2022-3602
[1:3.0.1-42]
- CVE-2022-3602: X.509 Email Address Buffer Overflow
Resolves: CVE-2022-3602 (rhbz#2137723)
[1:3.0.1-41]
- Zeroize public keys as required by FIPS 140-3
Related: rhbz#2102542
- Add FIPS indicator for HKDF
Related: rhbz#2114772
[1:3.0.1-40]
- Deal with DH keys in FIPS mode according FIPS-140-3 requirements
Related: rhbz#2102536
- Deal with ECDH keys in FIPS mode according FIPS-140-3 requirements
Related: rhbz#2102537
- Use signature for RSA pairwise test according FIPS-140-3 requirements
Related: rhbz#2102540
- Reseed all the parent DRBGs in chain on reseeding a DRBG
Related: rhbz#2102541
[1:3.0.1-39]
- Use RSA-OAEP in FIPS RSA encryption/decryption FIPS self-test
- Use Use digest_sign & digest_verify in FIPS signature self test
- Use FFDHE2048 in Diffie-Hellman FIPS self-test
Resolves: rhbz#2102535
[1:3.0.1-38]
- Fix segfault in EVP_PKEY_Q_keygen() when OpenSSL was not previously
initialized.
Resolves: rhbz#2103289
- Improve AES-GCM performance on Power9 and Power10 ppc64le
Resolves: rhbz#2051312
- Improve ChaCha20 performance on Power10 ppc64le
Resolves: rhbz#2051312
[1:3.0.1-37]
- CVE-2022-2097: AES OCB fails to encrypt some bytes on 32-bit x86
Resolves: CVE-2022-2097
[1:3.0.1-36]
- Ciphersuites with RSAPSK KX should be filterd in FIPS mode
- Related: rhbz#2085088
- FIPS provider should block RSA encryption for key transport.
- Other RSA encryption options should still be available if key length is enough
- Related: rhbz#2053289
- Improve diagnostics when passing unsupported groups in TLS
- Related: rhbz#2070197
- Fix PPC64 Montgomery multiplication bug
- Related: rhbz#2098199
- Strict certificates validation shouldn't allow explicit EC parameters
- Related: rhbz#2058663
- CVE-2022-2068: the c_rehash script allows command injection
- Related: rhbz#2098277
[1:3.0.1-35]
- Add explicit indicators for signatures in FIPS mode and mark signature
primitives as unapproved.
Resolves: rhbz#2087147
[1:3.0.1-34]
- Some OpenSSL test certificates are expired, updating
- Resolves: rhbz#2092456
[1:3.0.1-33]
- CVE-2022-1473 openssl: OPENSSL_LH_flush() breaks reuse of memory
- Resolves: rhbz#2089444
- CVE-2022-1343 openssl: Signer certificate verification returned
inaccurate response when using OCSP_NOCHECKS
- Resolves: rhbz#2087911
- CVE-2022-1292 openssl: c_rehash script allows command injection
- Resolves: rhbz#2090362
- Revert 'Disable EVP_PKEY_sign/EVP_PKEY_verify in FIPS mode'
Related: rhbz#2087147
- Use KAT for ECDSA signature tests, s390 arch
- Resolves: rhbz#2069235
[1:3.0.1-32]
- openssl ecparam -list_curves lists only FIPS-approved curves in FIPS mode
- Resolves: rhbz#2083240
- Ciphersuites with RSA KX should be filterd in FIPS mode
- Related: rhbz#2085088
- In FIPS mode, signature verification works with keys of arbitrary size
above 2048 bit, and only with 1024, 1280, 1536, 1792 bits for keys
below 2048 bits
- Resolves: rhbz#2077884
[1:3.0.1-31]
- Disable SHA-1 signature verification in FIPS mode
- Disable EVP_PKEY_sign/EVP_PKEY_verify in FIPS mode
Resolves: rhbz#2087147
[1:3.0.1-30]
- Use KAT for ECDSA signature tests
- Resolves: rhbz#2069235
[1:3.0.1-29]
- -config argument of openssl app should work properly in FIPS mode
- Resolves: rhbz#2083274
- openssl req defaults on PKCS#8 encryption changed to AES-256-CBC
- Resolves: rhbz#2063947
[1:3.0.1-28]
- OpenSSL should not accept custom elliptic curve parameters
- Resolves rhbz#2066412
- OpenSSL should not accept explicit curve parameters in FIPS mode
- Resolves rhbz#2058663
[1:3.0.1-27]
- Change FIPS module version to include hash of specfile, patches and sources
Resolves: rhbz#2070550
[1:3.0.1-26]
- OpenSSL FIPS module should not build in non-approved algorithms
- Resolves: rhbz#2081378
[1:3.0.1-25]
- FIPS provider should block RSA encryption for key transport.
- Other RSA encryption options should still be available
- Resolves: rhbz#2053289
[1:3.0.1-24]
- Fix regression in evp_pkey_name2type caused by tr_TR locale fix
Resolves: rhbz#2071631
[1:3.0.1-23]
- Fix openssl curl error with LANG=tr_TR.utf8
- Resolves: rhbz#2071631
[1:3.0.1-22]
- FIPS provider should block RSA encryption for key transport
- Resolves: rhbz#2053289
[1:3.0.1-21]
- Fix occasional internal error in TLS when DHE is used
- Resolves: rhbz#2004915
[1:3.0.1-20]
- Fix acceptance of SHA-1 certificates with rh-allow-sha1-signatures = yes when
no OpenSSL library context is set
- Resolves: rhbz#2065400
[1:3.0.1-19]
- Fix TLS connections with SHA1 signatures if rh-allow-sha1-signatures = yes
- Resolves: rhbz#2065400
[1:3.0.1-18]
- CVE-2022-0778 fix
- Resolves: rhbz#2062315
[1:3.0.1-17]
- Fix invocation of EVP_PKEY_CTX_set_rsa_padding(RSA_PKCS1_PSS_PADDING) before
setting an allowed digest with EVP_PKEY_CTX_set_signature_md()
- Skipping 3.0.1-16 due to version numbering confusion with the RHEL-9.0 branch
- Resolves: rhbz#2062640
[1:3.0.1-15]
- Allow SHA1 in SECLEVEL 2 if rh-allow-sha1-signatures = yes
- Resolves: rhbz#2060510
[1:3.0.1-14]
- Prevent use of SHA1 with ECDSA
- Resolves: rhbz#2031742
[1:3.0.1-13]
- OpenSSL will generate keys with prime192v1 curve if it is provided using explicit parameters
- Resolves: rhbz#1977867
[1:3.0.1-12]
- Support KBKDF (NIST SP800-108) with an R value of 8bits
- Resolves: rhbz#2027261
[1:3.0.1-11]
- Allow SHA1 usage in MGF1 for RSASSA-PSS signatures
- Resolves: rhbz#2031742
[1:3.0.1-10]
- rebuilt
[1:3.0.1-9]
- Allow SHA1 usage in HMAC in TLS
- Resolves: rhbz#2031742
[1:3.0.1-8]
- OpenSSL will generate keys with prime192v1 curve if it is provided using explicit parameters
- Resolves: rhbz#1977867
- pkcs12 export broken in FIPS mode
- Resolves: rhbz#2049265
[1:3.0.1-8]
- Disable SHA1 signature creation and verification by default
- Set rh-allow-sha1-signatures = yes to re-enable
- Resolves: rhbz#2031742
[1:3.0.1-7]
- s_server: correctly handle 2^14 byte long records
- Resolves: rhbz#2042011
[1:3.0.1-6]
- Adjust FIPS provider version
- Related: rhbz#2026445
[1:3.0.1-5]
- On the s390x, zeroize all the copies of TLS premaster secret
- Related: rhbz#2040448
[1:3.0.1-4]
- rebuilt
[1:3.0.1-3]
- KATS tests should be executed before HMAC verification
- Restoring fips=yes for SHA1
- Related: rhbz#2026445, rhbz#2041994
[1:3.0.1-2]
- Add enable-buildtest-c++ to the configure options.
- Related: rhbz#1990814
[1:3.0.1-1]
- Rebase to upstream version 3.0.1
- Fixes CVE-2021-4044 Invalid handling of X509_verify_cert() internal errors in libssl
- Resolves: rhbz#2038910, rhbz#2035148
[1:3.0.0-7]
- Remove algorithms we don't plan to certify from fips module
- Remove native fipsmodule.cnf
- Related: rhbz#2026445
[1:3.0.0-6]
- openssl speed should run in FIPS mode
- Related: rhbz#1977318
[1:3.0.0-5]
- rebuilt for spec cleanup
- Related: rhbz#1985362
[1:3.0.0-4]
- Embed FIPS HMAC in fips.so
- Enforce loading FIPS provider when FIPS kernel flag is on
- Related: rhbz#1985362
[1:3.0.0-3]
- Fix memory leak in s_client
- Related: rhbz#1996092
[1:3.0.0-2]
- Avoid double-free on error seeding the RNG.
- KTLS and FIPS may interfere, so tests need to be tuned
- Resolves: rhbz#1952844, rhbz#1961643
[1:3.0.0-1]
- Rebase to upstream version 3.0.0
- Related: rhbz#1990814
[1:3.0.0-0.beta2.7]
- Removes the dual-abi build as it not required anymore. The mass rebuild
was completed and all packages are rebuilt against Beta version.
- Resolves: rhbz#1984097
[1:3.0.0-0.beta2.6]
- Correctly process CMS reading from /dev/stdin
- Resolves: rhbz#1986315
[3.0.0-0.beta2.5]
- Add instruction for loading legacy provider in openssl.cnf
- Resolves: rhbz#1975836
[3.0.0-0.beta2.4]
- Adds support for IDEA encryption.
- Resolves: rhbz#1990602
[3.0.0-0.beta2.3]
- Fixes core dump in openssl req -modulus
- Fixes 'openssl req' to not ask for password when non-encrypted private key
is used
- cms: Do not try to check binary format on stdin and -rctform fix
- Resolves: rhbz#1988137, rhbz#1988468, rhbz#1988137
[1:3.0.0-0.beta2.2.1]
- Rebuilt for IMA sigs, glibc 2.34, aarch64 flags
Related: rhbz#1991688
[3.0.0-0.beta2.2]
- When signature_algorithm extension is omitted, use more relevant alerts
- Resolves: rhbz#1965017
[3.0.0-0.beta2.1]
- Rebase to upstream version beta2
- Related: rhbz#1903209
[3.0.0-0.beta1.5]
- Prevents creation of duplicate cert entries in PKCS #12 files
- Resolves: rhbz#1978670
[3.0.0-0.beta1.4]
- NVR bump to update to OpenSSL 3.0 Beta1
[3.0.0-0.beta1.3]
- Update patch dual-abi.patch to add the #define macros in implementation
files instead of public header files
[3.0.0-0.beta1.2]
- Removes unused patch dual-abi.patch
[3.0.0-0.beta1.1]
- Update to Beta1 version
- Includes a patch to support dual-ABI, as Beta1 brekas ABI with alpha16
[3.0.0-0.alpha16.7]
- Fixes override of openssl_conf in openssl.cnf
- Use AI_ADDRCONFIG only when explicit host name is given
- Temporarily remove fipsmodule.cnf for arch i686
- Fixes segmentation fault in BN_lebin2bn
- Resolves: rhbz#1975847, rhbz#1976845, rhbz#1973477, rhbz#1975855
[3.0.0-0.alpha16.6]
- Adds FIPS mode compatibility patch (sahana@redhat.com)
- Related: rhbz#1977318
[3.0.0-0.alpha16.5]
- Fixes system hang issue when booted in FIPS mode (sahana@redhat.com)
- Temporarily disable downstream FIPS patches
- Related: rhbz#1977318
[3.0.0-0.alpha16.4]
- Speeding up building openssl (dbelyavs@redhat.com)
Resolves: rhbz#1903209
[3.0.0-0.alpha16.3]
- Fix reading SPKAC data from stdin
- Fix incorrect OSSL_PKEY_PARAM_MAX_SIZE for ed25519 and ed448
- Return 0 after cleanup in OPENSSL_init_crypto()
- Cleanup the peer point formats on regotiation
- Fix default digest to SHA256
[3.0.0-0.alpha16.2]
- Enable FIPS via config options
[3.0.0-0.alpha16.1]
- Update to alpha 16 version
Resolves: rhbz#1952901 openssl sends alert after orderly connection close
CVE-2022-3358 |
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
Oracle Linux 9 (aarch64) | openssl-3.0.7-6.0.1.el9_2.src.rpm | f734ca73b91d3e0d0512796757dcb5ba34fc93a2d6a60db8629e9077a4e61f63 | - | ol9_aarch64_appstream |
openssl-3.0.7-6.0.1.el9_2.src.rpm | f734ca73b91d3e0d0512796757dcb5ba34fc93a2d6a60db8629e9077a4e61f63 | - | ol9_aarch64_baseos_latest | |
openssl-3.0.7-6.0.1.el9_2.src.rpm | f734ca73b91d3e0d0512796757dcb5ba34fc93a2d6a60db8629e9077a4e61f63 | - | ol9_aarch64_u2_baseos_base | |
openssl-3.0.7-6.0.1.el9_2.aarch64.rpm | 9c83326e0b5d4075068a850a2df8f75805f94568f6d44c42cf6b0cd0c21b019b | - | ol9_aarch64_baseos_latest | |
openssl-3.0.7-6.0.1.el9_2.aarch64.rpm | 9c83326e0b5d4075068a850a2df8f75805f94568f6d44c42cf6b0cd0c21b019b | - | ol9_aarch64_u2_baseos_base | |
openssl-devel-3.0.7-6.0.1.el9_2.aarch64.rpm | abf4bc76d378fc9480755c07a83a3361fcc4ab8af7a1698cbb75f8ac5233530c | - | ol9_aarch64_appstream | |
openssl-libs-3.0.7-6.0.1.el9_2.aarch64.rpm | c743b9dc5ce1eba55630f422cc5d4888e9c3fe6da9ed071967508ddd324627f3 | - | ol9_aarch64_baseos_latest | |
openssl-libs-3.0.7-6.0.1.el9_2.aarch64.rpm | c743b9dc5ce1eba55630f422cc5d4888e9c3fe6da9ed071967508ddd324627f3 | - | ol9_aarch64_u2_baseos_base | |
openssl-perl-3.0.7-6.0.1.el9_2.aarch64.rpm | 85c26e9b000a26805e42fb3b391339c06383d02292c9d3085872bb26fe06149e | - | ol9_aarch64_appstream | |
Oracle Linux 9 (x86_64) | openssl-3.0.7-6.0.1.el9_2.src.rpm | f734ca73b91d3e0d0512796757dcb5ba34fc93a2d6a60db8629e9077a4e61f63 | - | ol9_x86_64_appstream |
openssl-3.0.7-6.0.1.el9_2.src.rpm | f734ca73b91d3e0d0512796757dcb5ba34fc93a2d6a60db8629e9077a4e61f63 | - | ol9_x86_64_baseos_latest | |
openssl-3.0.7-6.0.1.el9_2.src.rpm | f734ca73b91d3e0d0512796757dcb5ba34fc93a2d6a60db8629e9077a4e61f63 | - | ol9_x86_64_u2_baseos_base | |
openssl-3.0.7-6.0.1.el9_2.x86_64.rpm | cc52bff1a589f24e052f9265a1b490c2ec3e62367363bfd3fd91a05c27092cdc | - | ol9_x86_64_baseos_latest | |
openssl-3.0.7-6.0.1.el9_2.x86_64.rpm | cc52bff1a589f24e052f9265a1b490c2ec3e62367363bfd3fd91a05c27092cdc | - | ol9_x86_64_u2_baseos_base | |
openssl-devel-3.0.7-6.0.1.el9_2.i686.rpm | 468b7f60f4051afb09680bcdcd5c0e306dcc73fe411327f4be54236aab43908c | - | ol9_x86_64_appstream | |
openssl-devel-3.0.7-6.0.1.el9_2.x86_64.rpm | cf9729748b347e665d7dccb807a718837f756cb5b63154b3d38bd79cdadfa6f9 | - | ol9_x86_64_appstream | |
openssl-libs-3.0.7-6.0.1.el9_2.i686.rpm | aa0d5ee12de426a23d2d05d80bee95607ed4990d40370230e9ce3456012418f2 | - | ol9_x86_64_baseos_latest | |
openssl-libs-3.0.7-6.0.1.el9_2.i686.rpm | aa0d5ee12de426a23d2d05d80bee95607ed4990d40370230e9ce3456012418f2 | - | ol9_x86_64_u2_baseos_base | |
openssl-libs-3.0.7-6.0.1.el9_2.x86_64.rpm | 4e55dc31db5a2d274efcbecff7daea647b70bec1c09dc1929a8e6eca067df9db | - | ol9_x86_64_baseos_latest | |
openssl-libs-3.0.7-6.0.1.el9_2.x86_64.rpm | 4e55dc31db5a2d274efcbecff7daea647b70bec1c09dc1929a8e6eca067df9db | - | ol9_x86_64_u2_baseos_base | |
openssl-perl-3.0.7-6.0.1.el9_2.x86_64.rpm | efef06a95fd789873a3b0522afb25c4b4482e13586d7351c1419d701518f03f8 | - | ol9_x86_64_appstream |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team