File _patchinfo of Package patchinfo.27638
<patchinfo incident="27638">
<issue tracker="bnc" id="1207541">VUL-0: EMBARGOED: CVE-2023-0401: openssl: NULL dereference during PKCS7 data verification</issue>
<issue tracker="bnc" id="1195149">missing zlib support in openssl</issue>
<issue tracker="bnc" id="1206222">SLES 15 SP4 - OpenSSL 3.0.x performance degradation on EDDSA, SHA3, and SHAKE</issue>
<issue tracker="bnc" id="1207539">VUL-0: EMBARGOED: CVE-2023-0216: openssl: Invalid pointer dereference in d2i_PKCS7 functions</issue>
<issue tracker="bnc" id="1207538">VUL-0: EMBARGOED: CVE-2022-4450: openssl: Double free after calling PEM_read_bio_ex</issue>
<issue tracker="bnc" id="1207535">VUL-0: EMBARGOED: CVE-2022-4203: openssl: X.509 Name Constraints Read Buffer Overflow</issue>
<issue tracker="bnc" id="1207534">VUL-0: EMBARGOED: CVE-2022-4304: openssl: Timing Oracle in RSA Decryption</issue>
<issue tracker="bnc" id="1207536">VUL-0: EMBARGOED: CVE-2023-0215: openssl: Use-after-free following BIO_new_NDEF</issue>
<issue tracker="bnc" id="1207533">VUL-0: EMBARGOED: CVE-2023-0286: openssl: X.400 address type confusion in X.509 GeneralName</issue>
<issue tracker="bnc" id="1207540">VUL-0: EMBARGOED: CVE-2023-0217: openssl: NULL dereference validating DSA public key</issue>
<issue tracker="cve" id="2023-0286"/>
<issue tracker="cve" id="2023-0216"/>
<issue tracker="cve" id="2022-4450"/>
<issue tracker="cve" id="2023-0215"/>
<issue tracker="cve" id="2023-0401"/>
<issue tracker="cve" id="2023-0217"/>
<issue tracker="cve" id="2022-4304"/>
<issue tracker="cve" id="2022-4203"/>
<packager>pmonrealgonzalez</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for openssl-3</summary>
<description>This update for openssl-3 fixes the following issues:
Security fixes:
- CVE-2023-0286: Fixed X.400 address type confusion in X.509 GENERAL_NAME_cmp for x400Address (bsc#1207533).
- CVE-2023-0401: Fixed NULL pointer dereference during PKCS7 data verification (bsc#1207541).
- CVE-2023-0217: Fixed NULL pointer dereference validating DSA public key (bsc#1207540).
- CVE-2023-0216: Fixed invalid pointer dereference in d2i_PKCS7 functions (bsc#1207539).
- CVE-2023-0215: Fixed use-after-free following BIO_new_NDEF() (bsc#1207536).
- CVE-2022-4450: Fixed double free after calling PEM_read_bio_ex() (bsc#1207538).
- CVE-2022-4304: Fixed timing Oracle in RSA Decryption (bsc#1207534).
- CVE-2022-4203: Fixed read Buffer Overflow with X.509 Name Constraints (bsc#1207535).
Non-security fixes:
- Fix SHA, SHAKE, KECCAK ASM and EC ASM flag passing (bsc#1206222).
- Enable zlib compression support (bsc#1195149).
- Add crypto-policies dependency.
</description>
</patchinfo>