[ELSA-2023-0946] openssl security and bug fix update
[3.0.1-47.0.1]
- Replace upstream references [Orabug: 34340177]
[1:3.0.1-47]
- Fixed X.509 Name Constraints Read Buffer Overflow
Resolves: CVE-2022-4203
- Fixed Timing Oracle in RSA Decryption
Resolves: CVE-2022-4304
- Fixed Double free after calling PEM_read_bio_ex
Resolves: CVE-2022-4450
- Fixed Use-after-free following BIO_new_NDEF
Resolves: CVE-2023-0215
- Fixed Invalid pointer dereference in d2i_PKCS7 functions
Resolves: CVE-2023-0216
- Fixed NULL dereference validating DSA public key
Resolves: CVE-2023-0217
- Fixed X.400 address type confusion in X.509 GeneralName
Resolves: CVE-2023-0286
- Fixed NULL dereference during PKCS7 data verification
Resolves: CVE-2023-0401
[1:3.0.1-46]
- Refactor OpenSSL fips module MAC verification
Resolves: rhbz#2158412
- Disallow SHAKE in RSA-OAEP decryption in FIPS mode
Resolves: rhbz#2144010
[1:3.0.1-45]
- Add support of X25519 and X448 'group' parameter in EVP_PKEY_CTX objects
Resolves: rhbz#2149010
- Fix explicit indicator for PSS salt length in FIPS mode when used with
negative magic values
Resolves: rhbz#2144012
- Update change to default PSS salt length with patch state from upstream
Related: rhbz#2144012
[1:3.0.1-44]
- SHAKE-128/256 are not allowed with RSA in FIPS mode
Resolves: rhbz#2144010
- Avoid memory leaks in TLS
Resolves: rhbz#2144008
- FIPS RSA CRT tests must use correct parameters
Resolves: rhbz#2144006
- FIPS-140-3 permits only SHA1, SHA256, and SHA512 for DRBG-HASH/DRBG-HMAC
Resolves: rhbz#2144017
- Remove support for X9.31 signature padding in FIPS mode
Resolves: rhbz#2144015
- Add explicit indicator for SP 800-108 KDFs with short key lengths
Resolves: rhbz#2144019
- Add explicit indicator for HMAC with short key lengths
Resolves: rhbz#2144000
- Set minimum password length for PBKDF2 in FIPS mode
Resolves: rhbz#2144003
- Add explicit indicator for PSS salt length in FIPS mode
Resolves: rhbz#2144012
- Clamp default PSS salt length to digest size for FIPS 186-4 compliance
Related: rhbz#2144012
- Forbid short RSA keys for key encapsulation/decapsulation in FIPS mode
Resolves: rhbz#2145170
Package | Affected Version |
---|---|
pkg:rpm/oraclelinux/openssl?distro=oraclelinux-9.1 | < 3.0.1-47.0.1.el9_1 |
pkg:rpm/oraclelinux/openssl-perl?distro=oraclelinux-9.1 | < 3.0.1-47.0.1.el9_1 |
pkg:rpm/oraclelinux/openssl-libs?distro=oraclelinux-9.1 | < 3.0.1-47.0.1.el9_1 |
pkg:rpm/oraclelinux/openssl-devel?distro=oraclelinux-9.1 | < 3.0.1-47.0.1.el9_1 |
- ID
- ELSA-2023-0946
- Severity
- moderate
- URL
- https://linux.oracle.com/errata/ELSA-2023-0946.html
- Published
-
2023-02-28T00:00:00
(18 months ago) - Modified
-
2023-02-28T00:00:00
(18 months ago) - Rights
- Copyright 2023 Oracle, Inc.
- Other Advisories
-
- ALAS-2023-1683
- ALAS2-2023-1934
- ALAS2-2023-1935
- ALAS2-2024-2502
- ALPINE:CVE-2022-4203
- ALPINE:CVE-2022-4304
- ALPINE:CVE-2022-4450
- ALPINE:CVE-2023-0215
- ALPINE:CVE-2023-0216
- ALPINE:CVE-2023-0217
- ALPINE:CVE-2023-0286
- ALPINE:CVE-2023-0401
- ALSA-2023:0946
- ALSA-2023:1405
- ALSA-2023:2165
- ALSA-2023:2932
- DSA-5343-1
- ELSA-2023-12152
- ELSA-2023-12205
- ELSA-2023-12210
- ELSA-2023-12213
- ELSA-2023-12297
- ELSA-2023-12326
- ELSA-2023-13024
- ELSA-2023-13025
- ELSA-2023-13026
- ELSA-2023-13027
- ELSA-2023-1335
- ELSA-2023-1405
- ELSA-2023-2165
- ELSA-2023-2932
- ELSA-2023-32790
- ELSA-2023-32791
- FEDORA-2023-57f33242bc
- FEDORA-2023-a5564c0a3f
- FEDORA-2023-e1ffb79ddf
- FEDORA-2023-e821b64a4c
- FREEBSD:648A432C-A71F-11ED-86E9-D4C9EF517024
- FREEBSD:C1A8ED1C-2814-4260-82AA-9E37C83AAC93
- FREEBSD:C8EB4C40-47BD-11EE-8E38-002590C1F29C
- FREEBSD:D86BECFE-05A4-11EE-9D4A-080027EDA32C
- GLSA-202402-08
- RHSA-2023:0946
- RHSA-2023:1335
- RHSA-2023:1405
- RHSA-2023:2165
- RHSA-2023:2932
- RLSA-2023:0946
- RLSA-2023:1405
- RUSTSEC-2023-0006
- RUSTSEC-2023-0007
- RUSTSEC-2023-0008
- RUSTSEC-2023-0009
- RUSTSEC-2023-0010
- RUSTSEC-2023-0011
- RUSTSEC-2023-0012
- RUSTSEC-2023-0013
- SSA:2023-038-01
- SUSE-SU-2023:0305-1
- SUSE-SU-2023:0305-2
- SUSE-SU-2023:0306-1
- SUSE-SU-2023:0307-1
- SUSE-SU-2023:0308-1
- SUSE-SU-2023:0309-1
- SUSE-SU-2023:0310-1
- SUSE-SU-2023:0311-1
- SUSE-SU-2023:0312-1
- SUSE-SU-2023:0482-1
- SUSE-SU-2023:0581-1
- SUSE-SU-2023:0584-1
- SUSE-SU-2023:0684-1
- SUSE-SU-2023:2622-1
- SUSE-SU-2023:2623-1
- SUSE-SU-2023:2624-1
- SUSE-SU-2023:2633-1
- SUSE-SU-2023:2634-1
- SUSE-SU-2023:2648-1
- SUSE-SU-2023:3096-1
- SUSE-SU-2023:3179-1
- USN-5844-1
- USN-5845-1
- USN-5845-2
- USN-6564-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2023-0946 | https://linux.oracle.com/errata/ELSA-2023-0946.html | |
CVE | CVE-2023-0401 | https://linux.oracle.com/cve/CVE-2023-0401.html | |
CVE | CVE-2022-4450 | https://linux.oracle.com/cve/CVE-2022-4450.html | |
CVE | CVE-2023-0216 | https://linux.oracle.com/cve/CVE-2023-0216.html | |
CVE | CVE-2023-0217 | https://linux.oracle.com/cve/CVE-2023-0217.html | |
CVE | CVE-2023-0286 | https://linux.oracle.com/cve/CVE-2023-0286.html | |
CVE | CVE-2023-0215 | https://linux.oracle.com/cve/CVE-2023-0215.html | |
CVE | CVE-2022-4304 | https://linux.oracle.com/cve/CVE-2022-4304.html | |
CVE | CVE-2022-4203 | https://linux.oracle.com/cve/CVE-2022-4203.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/openssl?distro=oraclelinux-9.1 | oraclelinux | openssl | < 3.0.1-47.0.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/openssl-perl?distro=oraclelinux-9.1 | oraclelinux | openssl-perl | < 3.0.1-47.0.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/openssl-libs?distro=oraclelinux-9.1 | oraclelinux | openssl-libs | < 3.0.1-47.0.1.el9_1 | oraclelinux-9.1 | ||
Affected | pkg:rpm/oraclelinux/openssl-devel?distro=oraclelinux-9.1 | oraclelinux | openssl-devel | < 3.0.1-47.0.1.el9_1 | oraclelinux-9.1 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |