File _patchinfo of Package patchinfo.36134
<patchinfo incident="36134"> <issue tracker="bnc" id="1224265">[FIPS 140-3][OpenSSL 1.1.1] PCT required</issue> <issue tracker="bnc" id="1224266">[FIPS 140-3][OpenSSL 1.1.1] Consider deprecating sha1</issue> <issue tracker="bnc" id="1224275">[FIPS 140-3][OpenSSL 1.1.1] PSS length</issue> <issue tracker="bnc" id="1224264">[FIPS 140-3][OpenSSL 1.1.1] Selftest and safe prime group</issue> <issue tracker="bnc" id="1224269">[FIPS 140-3][OpenSSL 1.1.1] X9.31 scheme is not approved for signatures</issue> <issue tracker="bnc" id="1228623">[FIPS 140-3][OpenSSL 1.1.1] HMAC input shall be bigger than 112 bits</issue> <issue tracker="bnc" id="1224270">[FIPS 140-3][OpenSSL 1.1.1] enforce KDF in FIPS style</issue> <issue tracker="bnc" id="1224273">[FIPS 140-3][OpenSSL 1.1.1] disalow RSA sigVER with 1024</issue> <issue tracker="bnc" id="1228618">[FIPS 140-3][OpenSSL 1.1.1] AES GCM implementation</issue> <issue tracker="bnc" id="1224258">[FIPS 140-3][OpenSSL 1.1.1] DRBG component chaining</issue> <issue tracker="bnc" id="1228619">[FIPS 140-3][OpenSSL 1.1.1] TLS KDF function improvement</issue> <issue tracker="bnc" id="1224272">[FIPS 140-3][OpenSSL 1.1.1] signature procedures regarding hashing and sign/verify</issue> <issue tracker="bnc" id="1224271">[FIPS 140-3][OpenSSL 1.1.1] PKCSv1.5 and shake</issue> <issue tracker="bnc" id="1224267">[FIPS 140-3][OpenSSL 1.1.1] remove non-approved KDF types</issue> <issue tracker="bnc" id="1220262">VUL-0: CVE-2023-50782: openssl: consider backporting implicit rejection in PKCS#1 v1.5</issue> <issue tracker="bnc" id="1224260">[FIPS 140-3][OpenSSL 1.1.1] change CRNG buf size</issue> <issue tracker="bnc" id="1224268">[FIPS 140-3][OpenSSL 1.1.1] Suggestion to remove drbg implementation files</issue> <issue tracker="cve" id="2023-50782"/> <packager>pmonrealgonzalez</packager> <rating>moderate</rating> <category>security</category> <summary>Security update for openssl-1_1</summary> <description>This update for openssl-1_1 fixes the following issues: Security fixes: - CVE-2023-50782: Implicit rejection in PKCS#1 v1.5 (bsc#1220262) Other fixes: - FIPS: AES GCM external IV implementation (bsc#1228618) - FIPS: Mark PBKDF2 and HKDF HMAC input keys with size >= 112 bits as approved in the SLI. (bsc#1228623) - FIPS: Enforce KDF in FIPS style (bsc#1224270) - FIPS: Mark HKDF and TLSv1.3 KDF as approved in the SLI (bsc#1228619) - FIPS: The X9.31 scheme is not approved for RSA signature operations in FIPS 186-5. (bsc#1224269) - FIPS: Differentiate the PSS length requirements (bsc#1224275) - FIPS: Mark sigGen and sigVer primitives as non-approved (bsc#1224272) - FIPS: Disable PKCSv1.5 and shake in FIPS mode (bsc#1224271) - FIPS: Mark SHA1 as non-approved in the SLI (bsc#1224266) - FIPS: DH FIPS selftest and safe prime group (bsc#1224264) - FIPS: Remove not needed FIPS DRBG files (bsc#1224268) - FIPS: Add Pair-wise Consistency Test when generating DH key (bsc#1224265) - FIPS: Disallow non-approved KDF types (bsc#1224267) - FIPS: Disallow RSA sigVer with 1024 and ECDSA sigVer/keyVer P-192 (bsc#1224273) - FIPS: DRBG component chaining (bsc#1224258) - FIPS: Align CRNGT_BUFSIZ with Jitter RNG output size (bsc#1224260) </description> </patchinfo>