| Name: | openssl-libs |
|---|---|
| Epoch: | 1 |
| Version: | 1.1.1k |
| Release: | 6.el8_5 |
| Architecture: | i686 |
| Group: | Unspecified |
| Size: | 3682534 |
| License: | OpenSSL and ASL 2.0 |
| RPM: | openssl-libs-1.1.1k-6.el8_5.i686.rpm |
| Source RPM: | openssl-1.1.1k-6.el8_5.src.rpm |
| Build Date: | Mon Mar 28 2022 |
| Build Host: | build-ol8-i386.oracle.com |
| Vendor: | Oracle America |
| URL: | http://www.openssl.org/ |
| Summary: | A general purpose cryptography library with TLS implementation |
| Description: | OpenSSL is a toolkit for supporting cryptography. The openssl-libs package contains the libraries that are used by various applications which support cryptographic algorithms and protocols. |
- Fixes CVE-2022-0778 openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates - Resolves: rhbz#2067144
- CVE-2021-3712 openssl: Read buffer overruns processing ASN.1 strings - Resolves: rhbz#2005400
- Fixes bugs in s390x AES code. - Uses the first detected address family if IPv6 is not available - Reverts the changes in https://github.com/openssl/openssl/pull/13305 as it introduces a regression if server has a DSA key pair, the handshake fails when the protocol is not explicitly set to TLS 1.2. However, if the patch is reverted, it has an effect on the "ssl_reject_handshake" feature in nginx. Although, this feature will continue to work, TLS 1.3 protocol becomes unavailable/disabled. This is already known - https://trac.nginx.org/nginx/ticket/2071#comment:1 As per https://github.com/openssl/openssl/issues/16075#issuecomment-879939938, nginx could early callback instead of servername callback. - Resolves: rhbz#1978214 - Related: rhbz#1934534
- Cleansup the peer point formats on renegotiation - Resolves rhbz#1965362
- Fixes FIPS_selftest to work in FIPS mode. Resolves: rhbz#1940085 - Using safe primes for FIPS DH self-test
- Update to version 1.1.1k
- Use AI_ADDRCONFIG only when explicit host name is given - Allow only curves defined in RFC 8446 in TLS 1.3
- Remove 2-key 3DES test from FIPS_selftest
- Fix CVE-2021-3450 openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT - Fix CVE-2021-3449 NULL pointer deref in signature_algorithms processing
- Fix CVE-2020-1971 ediparty null pointer dereference