Описание
ELSA-2023-2523: openssl security and bug fix update (LOW)
[3.0.7-6.0.1]
- Replace upstream references [Orabug: 34340177]
[1:3.0.7-6]
- Fixes RNG slowdown in FIPS mode Resolves: rhbz#2168224
[1:3.0.7-5]
- Fixed X.509 Name Constraints Read Buffer Overflow Resolves: CVE-2022-4203
- Fixed Timing Oracle in RSA Decryption Resolves: CVE-2022-4304
- Fixed Double free after calling PEM_read_bio_ex Resolves: CVE-2022-4450
- Fixed Use-after-free following BIO_new_NDEF Resolves: CVE-2023-0215
- Fixed Invalid pointer dereference in d2i_PKCS7 functions Resolves: CVE-2023-0216
- Fixed NULL dereference validating DSA public key Resolves: CVE-2023-0217
- Fixed X.400 address type confusion in X.509 GeneralName Resolves: CVE-2023-0286
- Fixed NULL dereference during PKCS7 data verification Resolves: CVE-2023-0401
[1:3.0.7-4]
- Disallow SHAKE in RSA-OAEP decryption in FIPS mode Resolves: rhbz#2142121
[1:3.0.7-3]
- Refactor OpenSSL fips module MAC verification Resolves: rhbz#2157965
[1:3.0.7-2]
- Various provider-related imrovements necessary for PKCS#11 provider correct operations Resolves: rhbz#2142517
- We should export 2 versions of OPENSSL_str[n]casecmp to be compatible with upstream Resolves: rhbz#2133809
- Removed recommended package for openssl-libs Resolves: rhbz#2093804
- Adjusting include for the FIPS_mode macro Resolves: rhbz#2083879
- Backport of ppc64le Montgomery multiply enhancement Resolves: rhbz#2130708
- Fix explicit indicator for PSS salt length in FIPS mode when used with negative magic values Resolves: rhbz#2142087
- Update change to default PSS salt length with patch state from upstream Related: rhbz#2142087
[1:3.0.7-1]
- Rebasing to OpenSSL 3.0.7 Resolves: rhbz#2129063
[1:3.0.1-44]
- SHAKE-128/256 are not allowed with RSA in FIPS mode Resolves: rhbz#2144010
- Avoid memory leaks in TLS Resolves: rhbz#2144008
- FIPS RSA CRT tests must use correct parameters Resolves: rhbz#2144006
- FIPS-140-3 permits only SHA1, SHA256, and SHA512 for DRBG-HASH/DRBG-HMAC Resolves: rhbz#2144017
- Remove support for X9.31 signature padding in FIPS mode Resolves: rhbz#2144015
- Add explicit indicator for SP 800-108 KDFs with short key lengths Resolves: rhbz#2144019
- Add explicit indicator for HMAC with short key lengths Resolves: rhbz#2144000
- Set minimum password length for PBKDF2 in FIPS mode Resolves: rhbz#2144003
- Add explicit indicator for PSS salt length in FIPS mode Resolves: rhbz#2144012
- Clamp default PSS salt length to digest size for FIPS 186-4 compliance Related: rhbz#2144012
- Forbid short RSA keys for key encapsulation/decapsulation in FIPS mode Resolves: rhbz#2145170
[1:3.0.1-43]
- CVE-2022-3602: X.509 Email Address Buffer Overflow
- CVE-2022-3786: X.509 Email Address Buffer Overflow Resolves: CVE-2022-3602
[1:3.0.1-42]
- CVE-2022-3602: X.509 Email Address Buffer Overflow Resolves: CVE-2022-3602 (rhbz#2137723)
[1:3.0.1-41]
- Zeroize public keys as required by FIPS 140-3 Related: rhbz#2102542
- Add FIPS indicator for HKDF Related: rhbz#2114772
[1:3.0.1-40]
- Deal with DH keys in FIPS mode according FIPS-140-3 requirements Related: rhbz#2102536
- Deal with ECDH keys in FIPS mode according FIPS-140-3 requirements Related: rhbz#2102537
- Use signature for RSA pairwise test according FIPS-140-3 requirements Related: rhbz#2102540
- Reseed all the parent DRBGs in chain on reseeding a DRBG Related: rhbz#2102541
[1:3.0.1-39]
- Use RSA-OAEP in FIPS RSA encryption/decryption FIPS self-test
- Use Use digest_sign & digest_verify in FIPS signature self test
- Use FFDHE2048 in Diffie-Hellman FIPS self-test Resolves: rhbz#2102535
[1:3.0.1-38]
- Fix segfault in EVP_PKEY_Q_keygen() when OpenSSL was not previously initialized. Resolves: rhbz#2103289
- Improve AES-GCM performance on Power9 and Power10 ppc64le Resolves: rhbz#2051312
- Improve ChaCha20 performance on Power10 ppc64le Resolves: rhbz#2051312
[1:3.0.1-37]
- CVE-2022-2097: AES OCB fails to encrypt some bytes on 32-bit x86 Resolves: CVE-2022-2097
[1:3.0.1-36]
- Ciphersuites with RSAPSK KX should be filterd in FIPS mode
- Related: rhbz#2085088
- FIPS provider should block RSA encryption for key transport.
- Other RSA encryption options should still be available if key length is enough
- Related: rhbz#2053289
- Improve diagnostics when passing unsupported groups in TLS
- Related: rhbz#2070197
- Fix PPC64 Montgomery multiplication bug
- Related: rhbz#2098199
- Strict certificates validation shouldn't allow explicit EC parameters
- Related: rhbz#2058663
- CVE-2022-2068: the c_rehash script allows command injection
- Related: rhbz#2098277
[1:3.0.1-35]
- Add explicit indicators for signatures in FIPS mode and mark signature primitives as unapproved. Resolves: rhbz#2087147
[1:3.0.1-34]
- Some OpenSSL test certificates are expired, updating
- Resolves: rhbz#2092456
[1:3.0.1-33]
- CVE-2022-1473 openssl: OPENSSL_LH_flush() breaks reuse of memory
- Resolves: rhbz#2089444
- CVE-2022-1343 openssl: Signer certificate verification returned inaccurate response when using OCSP_NOCHECKS
- Resolves: rhbz#2087911
- CVE-2022-1292 openssl: c_rehash script allows command injection
- Resolves: rhbz#2090362
- Revert 'Disable EVP_PKEY_sign/EVP_PKEY_verify in FIPS mode' Related: rhbz#2087147
- Use KAT for ECDSA signature tests, s390 arch
- Resolves: rhbz#2069235
[1:3.0.1-32]
- openssl ecparam -list_curves lists only FIPS-approved curves in FIPS mode
- Resolves: rhbz#2083240
- Ciphersuites with RSA KX should be filterd in FIPS mode
- Related: rhbz#2085088
- In FIPS mode, signature verification works with keys of arbitrary size above 2048 bit, and only with 1024, 1280, 1536, 1792 bits for keys below 2048 bits
- Resolves: rhbz#2077884
[1:3.0.1-31]
- Disable SHA-1 signature verification in FIPS mode
- Disable EVP_PKEY_sign/EVP_PKEY_verify in FIPS mode Resolves: rhbz#2087147
[1:3.0.1-30]
- Use KAT for ECDSA signature tests
- Resolves: rhbz#2069235
[1:3.0.1-29]
- -config argument of openssl app should work properly in FIPS mode
- Resolves: rhbz#2083274
- openssl req defaults on PKCS#8 encryption changed to AES-256-CBC
- Resolves: rhbz#2063947
[1:3.0.1-28]
- OpenSSL should not accept custom elliptic curve parameters
- Resolves rhbz#2066412
- OpenSSL should not accept explicit curve parameters in FIPS mode
- Resolves rhbz#2058663
[1:3.0.1-27]
- Change FIPS module version to include hash of specfile, patches and sources Resolves: rhbz#2070550
[1:3.0.1-26]
- OpenSSL FIPS module should not build in non-approved algorithms
- Resolves: rhbz#2081378
[1:3.0.1-25]
- FIPS provider should block RSA encryption for key transport.
- Other RSA encryption options should still be available
- Resolves: rhbz#2053289
[1:3.0.1-24]
- Fix regression in evp_pkey_name2type caused by tr_TR locale fix Resolves: rhbz#2071631
[1:3.0.1-23]
- Fix openssl curl error with LANG=tr_TR.utf8
- Resolves: rhbz#2071631
[1:3.0.1-22]
- FIPS provider should block RSA encryption for key transport
- Resolves: rhbz#2053289
[1:3.0.1-21]
- Fix occasional internal error in TLS when DHE is used
- Resolves: rhbz#2004915
[1:3.0.1-20]
- Fix acceptance of SHA-1 certificates with rh-allow-sha1-signatures = yes when no OpenSSL library context is set
- Resolves: rhbz#2065400
[1:3.0.1-19]
- Fix TLS connections with SHA1 signatures if rh-allow-sha1-signatures = yes
- Resolves: rhbz#2065400
[1:3.0.1-18]
- CVE-2022-0778 fix
- Resolves: rhbz#2062315
[1:3.0.1-17]
- Fix invocation of EVP_PKEY_CTX_set_rsa_padding(RSA_PKCS1_PSS_PADDING) before setting an allowed digest with EVP_PKEY_CTX_set_signature_md()
- Skipping 3.0.1-16 due to version numbering confusion with the RHEL-9.0 branch
- Resolves: rhbz#2062640
[1:3.0.1-15]
- Allow SHA1 in SECLEVEL 2 if rh-allow-sha1-signatures = yes
- Resolves: rhbz#2060510
[1:3.0.1-14]
- Prevent use of SHA1 with ECDSA
- Resolves: rhbz#2031742
[1:3.0.1-13]
- OpenSSL will generate keys with prime192v1 curve if it is provided using explicit parameters
- Resolves: rhbz#1977867
[1:3.0.1-12]
- Support KBKDF (NIST SP800-108) with an R value of 8bits
- Resolves: rhbz#2027261
[1:3.0.1-11]
- Allow SHA1 usage in MGF1 for RSASSA-PSS signatures
- Resolves: rhbz#2031742
[1:3.0.1-10]
- rebuilt
[1:3.0.1-9]
- Allow SHA1 usage in HMAC in TLS
- Resolves: rhbz#2031742
[1:3.0.1-8]
- OpenSSL will generate keys with prime192v1 curve if it is provided using explicit parameters
- Resolves: rhbz#1977867
- pkcs12 export broken in FIPS mode
- Resolves: rhbz#2049265
[1:3.0.1-8]
- Disable SHA1 signature creation and verification by default
- Set rh-allow-sha1-signatures = yes to re-enable
- Resolves: rhbz#2031742
[1:3.0.1-7]
- s_server: correctly handle 2^14 byte long records
- Resolves: rhbz#2042011
[1:3.0.1-6]
- Adjust FIPS provider version
- Related: rhbz#2026445
[1:3.0.1-5]
- On the s390x, zeroize all the copies of TLS premaster secret
- Related: rhbz#2040448
[1:3.0.1-4]
- rebuilt
[1:3.0.1-3]
- KATS tests should be executed before HMAC verification
- Restoring fips=yes for SHA1
- Related: rhbz#2026445, rhbz#2041994
[1:3.0.1-2]
- Add enable-buildtest-c++ to the configure options.
- Related: rhbz#1990814
[1:3.0.1-1]
- Rebase to upstream version 3.0.1
- Fixes CVE-2021-4044 Invalid handling of X509_verify_cert() internal errors in libssl
- Resolves: rhbz#2038910, rhbz#2035148
[1:3.0.0-7]
- Remove algorithms we don't plan to certify from fips module
- Remove native fipsmodule.cnf
- Related: rhbz#2026445
[1:3.0.0-6]
- openssl speed should run in FIPS mode
- Related: rhbz#1977318
[1:3.0.0-5]
- rebuilt for spec cleanup
- Related: rhbz#1985362
[1:3.0.0-4]
- Embed FIPS HMAC in fips.so
- Enforce loading FIPS provider when FIPS kernel flag is on
- Related: rhbz#1985362
[1:3.0.0-3]
- Fix memory leak in s_client
- Related: rhbz#1996092
[1:3.0.0-2]
- Avoid double-free on error seeding the RNG.
- KTLS and FIPS may interfere, so tests need to be tuned
- Resolves: rhbz#1952844, rhbz#1961643
[1:3.0.0-1]
- Rebase to upstream version 3.0.0
- Related: rhbz#1990814
[1:3.0.0-0.beta2.7]
- Removes the dual-abi build as it not required anymore. The mass rebuild was completed and all packages are rebuilt against Beta version.
- Resolves: rhbz#1984097
[1:3.0.0-0.beta2.6]
- Correctly process CMS reading from /dev/stdin
- Resolves: rhbz#1986315
[3.0.0-0.beta2.5]
- Add instruction for loading legacy provider in openssl.cnf
- Resolves: rhbz#1975836
[3.0.0-0.beta2.4]
- Adds support for IDEA encryption.
- Resolves: rhbz#1990602
[3.0.0-0.beta2.3]
- Fixes core dump in openssl req -modulus
- Fixes 'openssl req' to not ask for password when non-encrypted private key is used
- cms: Do not try to check binary format on stdin and -rctform fix
- Resolves: rhbz#1988137, rhbz#1988468, rhbz#1988137
[1:3.0.0-0.beta2.2.1]
- Rebuilt for IMA sigs, glibc 2.34, aarch64 flags Related: rhbz#1991688
[3.0.0-0.beta2.2]
- When signature_algorithm extension is omitted, use more relevant alerts
- Resolves: rhbz#1965017
[3.0.0-0.beta2.1]
- Rebase to upstream version beta2
- Related: rhbz#1903209
[3.0.0-0.beta1.5]
- Prevents creation of duplicate cert entries in PKCS #12 files
- Resolves: rhbz#1978670
[3.0.0-0.beta1.4]
- NVR bump to update to OpenSSL 3.0 Beta1
[3.0.0-0.beta1.3]
- Update patch dual-abi.patch to add the #define macros in implementation files instead of public header files
[3.0.0-0.beta1.2]
- Removes unused patch dual-abi.patch
[3.0.0-0.beta1.1]
- Update to Beta1 version
- Includes a patch to support dual-ABI, as Beta1 brekas ABI with alpha16
[3.0.0-0.alpha16.7]
- Fixes override of openssl_conf in openssl.cnf
- Use AI_ADDRCONFIG only when explicit host name is given
- Temporarily remove fipsmodule.cnf for arch i686
- Fixes segmentation fault in BN_lebin2bn
- Resolves: rhbz#1975847, rhbz#1976845, rhbz#1973477, rhbz#1975855
[3.0.0-0.alpha16.6]
- Adds FIPS mode compatibility patch (sahana@redhat.com)
- Related: rhbz#1977318
[3.0.0-0.alpha16.5]
- Fixes system hang issue when booted in FIPS mode (sahana@redhat.com)
- Temporarily disable downstream FIPS patches
- Related: rhbz#1977318
[3.0.0-0.alpha16.4]
- Speeding up building openssl (dbelyavs@redhat.com) Resolves: rhbz#1903209
[3.0.0-0.alpha16.3]
- Fix reading SPKAC data from stdin
- Fix incorrect OSSL_PKEY_PARAM_MAX_SIZE for ed25519 and ed448
- Return 0 after cleanup in OPENSSL_init_crypto()
- Cleanup the peer point formats on regotiation
- Fix default digest to SHA256
[3.0.0-0.alpha16.2]
- Enable FIPS via config options
[3.0.0-0.alpha16.1]
- Update to alpha 16 version Resolves: rhbz#1952901 openssl sends alert after orderly connection close
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
openssl
3.0.7-6.0.1.el9_2
openssl-devel
3.0.7-6.0.1.el9_2
openssl-libs
3.0.7-6.0.1.el9_2
openssl-perl
3.0.7-6.0.1.el9_2
Oracle Linux x86_64
openssl
3.0.7-6.0.1.el9_2
openssl-devel
3.0.7-6.0.1.el9_2
openssl-libs
3.0.7-6.0.1.el9_2
openssl-perl
3.0.7-6.0.1.el9_2
Связанные CVE
Связанные уязвимости
OpenSSL supports creating a custom cipher via the legacy EVP_CIPHER_meth_new() function and associated function calls. This function was deprecated in OpenSSL 3.0 and application authors are instead encouraged to use the new provider mechanism in order to implement custom ciphers. OpenSSL versions 3.0.0 to 3.0.5 incorrectly handle legacy custom ciphers passed to the EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() and EVP_CipherInit_ex2() functions (as well as other similarly named encryption and decryption initialisation functions). Instead of using the custom cipher directly it incorrectly tries to fetch an equivalent cipher from the available providers. An equivalent cipher is found based on the NID passed to EVP_CIPHER_meth_new(). This NID is supposed to represent the unique NID for a given cipher. However it is possible for an application to incorrectly pass NID_undef as this value in the call to EVP_CIPHER_meth_new(). When NID_undef is used in this way the OpenSSL encryption/decry...
OpenSSL supports creating a custom cipher via the legacy EVP_CIPHER_meth_new() function and associated function calls. This function was deprecated in OpenSSL 3.0 and application authors are instead encouraged to use the new provider mechanism in order to implement custom ciphers. OpenSSL versions 3.0.0 to 3.0.5 incorrectly handle legacy custom ciphers passed to the EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() and EVP_CipherInit_ex2() functions (as well as other similarly named encryption and decryption initialisation functions). Instead of using the custom cipher directly it incorrectly tries to fetch an equivalent cipher from the available providers. An equivalent cipher is found based on the NID passed to EVP_CIPHER_meth_new(). This NID is supposed to represent the unique NID for a given cipher. However it is possible for an application to incorrectly pass NID_undef as this value in the call to EVP_CIPHER_meth_new(). When NID_undef is used in this way the OpenSSL encryption/decry...
OpenSSL supports creating a custom cipher via the legacy EVP_CIPHER_meth_new() function and associated function calls. This function was deprecated in OpenSSL 3.0 and application authors are instead encouraged to use the new provider mechanism in order to implement custom ciphers. OpenSSL versions 3.0.0 to 3.0.5 incorrectly handle legacy custom ciphers passed to the EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() and EVP_CipherInit_ex2() functions (as well as other similarly named encryption and decryption initialisation functions). Instead of using the custom cipher directly it incorrectly tries to fetch an equivalent cipher from the available providers. An equivalent cipher is found based on the NID passed to EVP_CIPHER_meth_new(). This NID is supposed to represent the unique NID for a given cipher. However it is possible for an application to incorrectly pass NID_undef as this value in the call to EVP_CIPHER_meth_new(). When NID_undef is used in this way the OpenSSL encryption/decrypti
OpenSSL supports creating a custom cipher via the legacy EVP_CIPHER_me ...
Using a Custom Cipher with `NID_undef` may lead to NULL encryption