Lucene search

K
oraclelinuxOracleLinuxELSA-2023-2523
HistoryMay 15, 2023 - 12:00 a.m.

openssl security and bug fix update

2023-05-1500:00:00
linux.oracle.com
25

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

33.0%

[3.0.7-6.0.1]

  • Replace upstream references [Orabug: 34340177]
    [1:3.0.7-6]
  • Fixes RNG slowdown in FIPS mode
    Resolves: rhbz#2168224
    [1:3.0.7-5]
  • Fixed X.509 Name Constraints Read Buffer Overflow
    Resolves: CVE-2022-4203
  • Fixed Timing Oracle in RSA Decryption
    Resolves: CVE-2022-4304
  • Fixed Double free after calling PEM_read_bio_ex
    Resolves: CVE-2022-4450
  • Fixed Use-after-free following BIO_new_NDEF
    Resolves: CVE-2023-0215
  • Fixed Invalid pointer dereference in d2i_PKCS7 functions
    Resolves: CVE-2023-0216
  • Fixed NULL dereference validating DSA public key
    Resolves: CVE-2023-0217
  • Fixed X.400 address type confusion in X.509 GeneralName
    Resolves: CVE-2023-0286
  • Fixed NULL dereference during PKCS7 data verification
    Resolves: CVE-2023-0401
    [1:3.0.7-4]
  • Disallow SHAKE in RSA-OAEP decryption in FIPS mode
    Resolves: rhbz#2142121
    [1:3.0.7-3]
  • Refactor OpenSSL fips module MAC verification
    Resolves: rhbz#2157965
    [1:3.0.7-2]
  • Various provider-related imrovements necessary for PKCS#11 provider correct operations
    Resolves: rhbz#2142517
  • We should export 2 versions of OPENSSL_str[n]casecmp to be compatible with upstream
    Resolves: rhbz#2133809
  • Removed recommended package for openssl-libs
    Resolves: rhbz#2093804
  • Adjusting include for the FIPS_mode macro
    Resolves: rhbz#2083879
  • Backport of ppc64le Montgomery multiply enhancement
    Resolves: rhbz#2130708
  • Fix explicit indicator for PSS salt length in FIPS mode when used with
    negative magic values
    Resolves: rhbz#2142087
  • Update change to default PSS salt length with patch state from upstream
    Related: rhbz#2142087
    [1:3.0.7-1]
  • Rebasing to OpenSSL 3.0.7
    Resolves: rhbz#2129063
    [1:3.0.1-44]
  • SHAKE-128/256 are not allowed with RSA in FIPS mode
    Resolves: rhbz#2144010
  • Avoid memory leaks in TLS
    Resolves: rhbz#2144008
  • FIPS RSA CRT tests must use correct parameters
    Resolves: rhbz#2144006
  • FIPS-140-3 permits only SHA1, SHA256, and SHA512 for DRBG-HASH/DRBG-HMAC
    Resolves: rhbz#2144017
  • Remove support for X9.31 signature padding in FIPS mode
    Resolves: rhbz#2144015
  • Add explicit indicator for SP 800-108 KDFs with short key lengths
    Resolves: rhbz#2144019
  • Add explicit indicator for HMAC with short key lengths
    Resolves: rhbz#2144000
  • Set minimum password length for PBKDF2 in FIPS mode
    Resolves: rhbz#2144003
  • Add explicit indicator for PSS salt length in FIPS mode
    Resolves: rhbz#2144012
  • Clamp default PSS salt length to digest size for FIPS 186-4 compliance
    Related: rhbz#2144012
  • Forbid short RSA keys for key encapsulation/decapsulation in FIPS mode
    Resolves: rhbz#2145170
    [1:3.0.1-43]
  • CVE-2022-3602: X.509 Email Address Buffer Overflow
  • CVE-2022-3786: X.509 Email Address Buffer Overflow
    Resolves: CVE-2022-3602
    [1:3.0.1-42]
  • CVE-2022-3602: X.509 Email Address Buffer Overflow
    Resolves: CVE-2022-3602 (rhbz#2137723)
    [1:3.0.1-41]
  • Zeroize public keys as required by FIPS 140-3
    Related: rhbz#2102542
  • Add FIPS indicator for HKDF
    Related: rhbz#2114772
    [1:3.0.1-40]
  • Deal with DH keys in FIPS mode according FIPS-140-3 requirements
    Related: rhbz#2102536
  • Deal with ECDH keys in FIPS mode according FIPS-140-3 requirements
    Related: rhbz#2102537
  • Use signature for RSA pairwise test according FIPS-140-3 requirements
    Related: rhbz#2102540
  • Reseed all the parent DRBGs in chain on reseeding a DRBG
    Related: rhbz#2102541
    [1:3.0.1-39]
  • Use RSA-OAEP in FIPS RSA encryption/decryption FIPS self-test
  • Use Use digest_sign & digest_verify in FIPS signature self test
  • Use FFDHE2048 in Diffie-Hellman FIPS self-test
    Resolves: rhbz#2102535
    [1:3.0.1-38]
  • Fix segfault in EVP_PKEY_Q_keygen() when OpenSSL was not previously
    initialized.
    Resolves: rhbz#2103289
  • Improve AES-GCM performance on Power9 and Power10 ppc64le
    Resolves: rhbz#2051312
  • Improve ChaCha20 performance on Power10 ppc64le
    Resolves: rhbz#2051312
    [1:3.0.1-37]
  • CVE-2022-2097: AES OCB fails to encrypt some bytes on 32-bit x86
    Resolves: CVE-2022-2097
    [1:3.0.1-36]
  • Ciphersuites with RSAPSK KX should be filterd in FIPS mode
  • Related: rhbz#2085088
  • FIPS provider should block RSA encryption for key transport.
  • Other RSA encryption options should still be available if key length is enough
  • Related: rhbz#2053289
  • Improve diagnostics when passing unsupported groups in TLS
  • Related: rhbz#2070197
  • Fix PPC64 Montgomery multiplication bug
  • Related: rhbz#2098199
  • Strict certificates validation shouldn’t allow explicit EC parameters
  • Related: rhbz#2058663
  • CVE-2022-2068: the c_rehash script allows command injection
  • Related: rhbz#2098277
    [1:3.0.1-35]
  • Add explicit indicators for signatures in FIPS mode and mark signature
    primitives as unapproved.
    Resolves: rhbz#2087147
    [1:3.0.1-34]
  • Some OpenSSL test certificates are expired, updating
  • Resolves: rhbz#2092456
    [1:3.0.1-33]
  • CVE-2022-1473 openssl: OPENSSL_LH_flush() breaks reuse of memory
  • Resolves: rhbz#2089444
  • CVE-2022-1343 openssl: Signer certificate verification returned
    inaccurate response when using OCSP_NOCHECKS
  • Resolves: rhbz#2087911
  • CVE-2022-1292 openssl: c_rehash script allows command injection
  • Resolves: rhbz#2090362
  • Revert ‘Disable EVP_PKEY_sign/EVP_PKEY_verify in FIPS mode’
    Related: rhbz#2087147
  • Use KAT for ECDSA signature tests, s390 arch
  • Resolves: rhbz#2069235
    [1:3.0.1-32]
  • openssl ecparam -list_curves lists only FIPS-approved curves in FIPS mode
  • Resolves: rhbz#2083240
  • Ciphersuites with RSA KX should be filterd in FIPS mode
  • Related: rhbz#2085088
  • In FIPS mode, signature verification works with keys of arbitrary size
    above 2048 bit, and only with 1024, 1280, 1536, 1792 bits for keys
    below 2048 bits
  • Resolves: rhbz#2077884
    [1:3.0.1-31]
  • Disable SHA-1 signature verification in FIPS mode
  • Disable EVP_PKEY_sign/EVP_PKEY_verify in FIPS mode
    Resolves: rhbz#2087147
    [1:3.0.1-30]
  • Use KAT for ECDSA signature tests
  • Resolves: rhbz#2069235
    [1:3.0.1-29]
  • -config argument of openssl app should work properly in FIPS mode
  • Resolves: rhbz#2083274
  • openssl req defaults on PKCS#8 encryption changed to AES-256-CBC
  • Resolves: rhbz#2063947
    [1:3.0.1-28]
  • OpenSSL should not accept custom elliptic curve parameters
  • Resolves rhbz#2066412
  • OpenSSL should not accept explicit curve parameters in FIPS mode
  • Resolves rhbz#2058663
    [1:3.0.1-27]
  • Change FIPS module version to include hash of specfile, patches and sources
    Resolves: rhbz#2070550
    [1:3.0.1-26]
  • OpenSSL FIPS module should not build in non-approved algorithms
  • Resolves: rhbz#2081378
    [1:3.0.1-25]
  • FIPS provider should block RSA encryption for key transport.
  • Other RSA encryption options should still be available
  • Resolves: rhbz#2053289
    [1:3.0.1-24]
  • Fix regression in evp_pkey_name2type caused by tr_TR locale fix
    Resolves: rhbz#2071631
    [1:3.0.1-23]
  • Fix openssl curl error with LANG=tr_TR.utf8
  • Resolves: rhbz#2071631
    [1:3.0.1-22]
  • FIPS provider should block RSA encryption for key transport
  • Resolves: rhbz#2053289
    [1:3.0.1-21]
  • Fix occasional internal error in TLS when DHE is used
  • Resolves: rhbz#2004915
    [1:3.0.1-20]
  • Fix acceptance of SHA-1 certificates with rh-allow-sha1-signatures = yes when
    no OpenSSL library context is set
  • Resolves: rhbz#2065400
    [1:3.0.1-19]
  • Fix TLS connections with SHA1 signatures if rh-allow-sha1-signatures = yes
  • Resolves: rhbz#2065400
    [1:3.0.1-18]
  • CVE-2022-0778 fix
  • Resolves: rhbz#2062315
    [1:3.0.1-17]
  • Fix invocation of EVP_PKEY_CTX_set_rsa_padding(RSA_PKCS1_PSS_PADDING) before
    setting an allowed digest with EVP_PKEY_CTX_set_signature_md()
  • Skipping 3.0.1-16 due to version numbering confusion with the RHEL-9.0 branch
  • Resolves: rhbz#2062640
    [1:3.0.1-15]
  • Allow SHA1 in SECLEVEL 2 if rh-allow-sha1-signatures = yes
  • Resolves: rhbz#2060510
    [1:3.0.1-14]
  • Prevent use of SHA1 with ECDSA
  • Resolves: rhbz#2031742
    [1:3.0.1-13]
  • OpenSSL will generate keys with prime192v1 curve if it is provided using explicit parameters
  • Resolves: rhbz#1977867
    [1:3.0.1-12]
  • Support KBKDF (NIST SP800-108) with an R value of 8bits
  • Resolves: rhbz#2027261
    [1:3.0.1-11]
  • Allow SHA1 usage in MGF1 for RSASSA-PSS signatures
  • Resolves: rhbz#2031742
    [1:3.0.1-10]
  • rebuilt
    [1:3.0.1-9]
  • Allow SHA1 usage in HMAC in TLS
  • Resolves: rhbz#2031742
    [1:3.0.1-8]
  • OpenSSL will generate keys with prime192v1 curve if it is provided using explicit parameters
  • Resolves: rhbz#1977867
  • pkcs12 export broken in FIPS mode
  • Resolves: rhbz#2049265
    [1:3.0.1-8]
  • Disable SHA1 signature creation and verification by default
  • Set rh-allow-sha1-signatures = yes to re-enable
  • Resolves: rhbz#2031742
    [1:3.0.1-7]
  • s_server: correctly handle 2^14 byte long records
  • Resolves: rhbz#2042011
    [1:3.0.1-6]
  • Adjust FIPS provider version
  • Related: rhbz#2026445
    [1:3.0.1-5]
  • On the s390x, zeroize all the copies of TLS premaster secret
  • Related: rhbz#2040448
    [1:3.0.1-4]
  • rebuilt
    [1:3.0.1-3]
  • KATS tests should be executed before HMAC verification
  • Restoring fips=yes for SHA1
  • Related: rhbz#2026445, rhbz#2041994
    [1:3.0.1-2]
  • Add enable-buildtest-c++ to the configure options.
  • Related: rhbz#1990814
    [1:3.0.1-1]
  • Rebase to upstream version 3.0.1
  • Fixes CVE-2021-4044 Invalid handling of X509_verify_cert() internal errors in libssl
  • Resolves: rhbz#2038910, rhbz#2035148
    [1:3.0.0-7]
  • Remove algorithms we don’t plan to certify from fips module
  • Remove native fipsmodule.cnf
  • Related: rhbz#2026445
    [1:3.0.0-6]
  • openssl speed should run in FIPS mode
  • Related: rhbz#1977318
    [1:3.0.0-5]
  • rebuilt for spec cleanup
  • Related: rhbz#1985362
    [1:3.0.0-4]
  • Embed FIPS HMAC in fips.so
  • Enforce loading FIPS provider when FIPS kernel flag is on
  • Related: rhbz#1985362
    [1:3.0.0-3]
  • Fix memory leak in s_client
  • Related: rhbz#1996092
    [1:3.0.0-2]
  • Avoid double-free on error seeding the RNG.
  • KTLS and FIPS may interfere, so tests need to be tuned
  • Resolves: rhbz#1952844, rhbz#1961643
    [1:3.0.0-1]
  • Rebase to upstream version 3.0.0
  • Related: rhbz#1990814
    [1:3.0.0-0.beta2.7]
  • Removes the dual-abi build as it not required anymore. The mass rebuild
    was completed and all packages are rebuilt against Beta version.
  • Resolves: rhbz#1984097
    [1:3.0.0-0.beta2.6]
  • Correctly process CMS reading from /dev/stdin
  • Resolves: rhbz#1986315
    [3.0.0-0.beta2.5]
  • Add instruction for loading legacy provider in openssl.cnf
  • Resolves: rhbz#1975836
    [3.0.0-0.beta2.4]
  • Adds support for IDEA encryption.
  • Resolves: rhbz#1990602
    [3.0.0-0.beta2.3]
  • Fixes core dump in openssl req -modulus
  • Fixes ‘openssl req’ to not ask for password when non-encrypted private key
    is used
  • cms: Do not try to check binary format on stdin and -rctform fix
  • Resolves: rhbz#1988137, rhbz#1988468, rhbz#1988137
    [1:3.0.0-0.beta2.2.1]
  • Rebuilt for IMA sigs, glibc 2.34, aarch64 flags
    Related: rhbz#1991688
    [3.0.0-0.beta2.2]
  • When signature_algorithm extension is omitted, use more relevant alerts
  • Resolves: rhbz#1965017
    [3.0.0-0.beta2.1]
  • Rebase to upstream version beta2
  • Related: rhbz#1903209
    [3.0.0-0.beta1.5]
  • Prevents creation of duplicate cert entries in PKCS #12 files
  • Resolves: rhbz#1978670
    [3.0.0-0.beta1.4]
  • NVR bump to update to OpenSSL 3.0 Beta1
    [3.0.0-0.beta1.3]
  • Update patch dual-abi.patch to add the #define macros in implementation
    files instead of public header files
    [3.0.0-0.beta1.2]
  • Removes unused patch dual-abi.patch
    [3.0.0-0.beta1.1]
  • Update to Beta1 version
  • Includes a patch to support dual-ABI, as Beta1 brekas ABI with alpha16
    [3.0.0-0.alpha16.7]
  • Fixes override of openssl_conf in openssl.cnf
  • Use AI_ADDRCONFIG only when explicit host name is given
  • Temporarily remove fipsmodule.cnf for arch i686
  • Fixes segmentation fault in BN_lebin2bn
  • Resolves: rhbz#1975847, rhbz#1976845, rhbz#1973477, rhbz#1975855
    [3.0.0-0.alpha16.6]
  • Adds FIPS mode compatibility patch ([email protected])
  • Related: rhbz#1977318
    [3.0.0-0.alpha16.5]
  • Fixes system hang issue when booted in FIPS mode ([email protected])
  • Temporarily disable downstream FIPS patches
  • Related: rhbz#1977318
    [3.0.0-0.alpha16.4]
  • Speeding up building openssl ([email protected])
    Resolves: rhbz#1903209
    [3.0.0-0.alpha16.3]
  • Fix reading SPKAC data from stdin
  • Fix incorrect OSSL_PKEY_PARAM_MAX_SIZE for ed25519 and ed448
  • Return 0 after cleanup in OPENSSL_init_crypto()
  • Cleanup the peer point formats on regotiation
  • Fix default digest to SHA256
    [3.0.0-0.alpha16.2]
  • Enable FIPS via config options
    [3.0.0-0.alpha16.1]
  • Update to alpha 16 version
    Resolves: rhbz#1952901 openssl sends alert after orderly connection close

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

33.0%