Security Vulnerabilities fixed in openssl RHSA-2022:6224

description-logoDescription

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): openssl: c_rehash script allows command injection (CVE-2022-1292) openssl: Signer certificate verification returns inaccurate response when using OCSP_NOCHECKS (CVE-2022-1343) openssl: OPENSSL_LH_flush() breaks reuse of memory (CVE-2022-1473) openssl: the c_rehash script allows command injection (CVE-2022-2068) openssl: AES OCB fails to encrypt some bytes (CVE-2022-2097) openssl: c_rehash script allows command injection (CVE-2022-1292) openssl: Signer certificate verification returns inaccurate response when using OCSP_NOCHECKS (CVE-2022-1343) openssl: OPENSSL_LH_flush() breaks reuse of memory (CVE-2022-1473) openssl: the c_rehash script allows command injection (CVE-2022-2068) openssl: AES OCB fails to encrypt some bytes (CVE-2022-2097) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): openssl occasionally sends internal error to gnutls when using FFDHE (BZ#2080323) openssl req defaults to 3DES (BZ#2085499) OpenSSL accepts custom elliptic curve parameters when p is large [rhel-9] (BZ#2085508) OpenSSL mustn't work with ECDSA with explicit curve parameters in FIPS mode (BZ#2085521) openssl s_server -groups secp256k1 in FIPS fails because X25519/X448 (BZ#2086554) Converting FIPS power-on self test to KAT (BZ#2086866) Small RSA keys work for some operations in FIPS mode (BZ#2091938) FIPS provider doesn't block RSA encryption for key transport (BZ#2091977) OpenSSL testsuite certificates expired (BZ#2095696) [IBM 9.1 HW OPT] POWER10 performance enhancements for cryptography: OpenSSL (BZ#2103044) [FIPS lab review] self-test (BZ#2112978) [FIPS lab review] DH tuning (BZ#2115856) [FIPS lab review] EC tuning (BZ#2115857) [FIPS lab review] RSA tuning (BZ#2115858) [FIPS lab review] RAND tuning (BZ#2115859) [FIPS lab review] zeroization (BZ#2115861) [FIPS lab review] HKDF limitations (BZ#2118388) openssl occasionally sends internal error to gnutls when using FFDHE (BZ#2080323) openssl req defaults to 3DES (BZ#2085499) OpenSSL accepts custom elliptic curve parameters when p is large [rhel-9] (BZ#2085508) OpenSSL mustn't work with ECDSA with explicit curve parameters in FIPS mode (BZ#2085521) openssl s_server -groups secp256k1 in FIPS fails because X25519/X448 (BZ#2086554) Converting FIPS power-on self test to KAT (BZ#2086866) Small RSA keys work for some operations in FIPS mode (BZ#2091938) FIPS provider doesn't block RSA encryption for key transport (BZ#2091977) OpenSSL testsuite certificates expired (BZ#2095696) [IBM 9.1 HW OPT] POWER10 performance enhancements for cryptography: OpenSSL (BZ#2103044) [FIPS lab review] self-test (BZ#2112978) [FIPS lab review] DH tuning (BZ#2115856) [FIPS lab review] EC tuning (BZ#2115857) [FIPS lab review] RSA tuning (BZ#2115858) [FIPS lab review] RAND tuning (BZ#2115859) [FIPS lab review] zeroization (BZ#2115861) [FIPS lab review] HKDF limitations (BZ#2118388) SolutionFor details on how to apply this update, which includes the changes described in this advisory, refer to:https://access.redhat.com/articles/11258 For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

affected-products-logoAffected Applications

openssl