| Name: | openssl-libs | 
|---|---|
| Epoch: | 1 | 
| Version: | 1.1.1k | 
| Release: | 6.el8_5 | 
| Architecture: | i686 | 
| Group: | Unspecified | 
| Size: | 3682534 | 
| License: | OpenSSL and ASL 2.0 | 
| RPM: | openssl-libs-1.1.1k-6.el8_5.i686.rpm | 
| Source RPM: | openssl-1.1.1k-6.el8_5.src.rpm | 
| Build Date: | Mon Mar 28 2022 | 
| Build Host: | build-ol8-i386.oracle.com | 
| Vendor: | Oracle America | 
| URL: | http://www.openssl.org/ | 
| Summary: | A general purpose cryptography library with TLS implementation | 
| Description: | OpenSSL is a toolkit for supporting cryptography. The openssl-libs package contains the libraries that are used by various applications which support cryptographic algorithms and protocols. | 
- Fixes CVE-2022-0778 openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates - Resolves: rhbz#2067144
- CVE-2021-3712 openssl: Read buffer overruns processing ASN.1 strings - Resolves: rhbz#2005400
- Fixes bugs in s390x AES code. - Uses the first detected address family if IPv6 is not available - Reverts the changes in https://github.com/openssl/openssl/pull/13305 as it introduces a regression if server has a DSA key pair, the handshake fails when the protocol is not explicitly set to TLS 1.2. However, if the patch is reverted, it has an effect on the "ssl_reject_handshake" feature in nginx. Although, this feature will continue to work, TLS 1.3 protocol becomes unavailable/disabled. This is already known - https://trac.nginx.org/nginx/ticket/2071#comment:1 As per https://github.com/openssl/openssl/issues/16075#issuecomment-879939938, nginx could early callback instead of servername callback. - Resolves: rhbz#1978214 - Related: rhbz#1934534
- Cleansup the peer point formats on renegotiation - Resolves rhbz#1965362
- Fixes FIPS_selftest to work in FIPS mode. Resolves: rhbz#1940085 - Using safe primes for FIPS DH self-test
- Update to version 1.1.1k
- Use AI_ADDRCONFIG only when explicit host name is given - Allow only curves defined in RFC 8446 in TLS 1.3
- Remove 2-key 3DES test from FIPS_selftest
- Fix CVE-2021-3450 openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT - Fix CVE-2021-3449 NULL pointer deref in signature_algorithms processing
- Fix CVE-2020-1971 ediparty null pointer dereference