Skip to content

Commit

Permalink
Update FIPS and CVE page in light of 3.0.8 FIPS provider
Browse files Browse the repository at this point in the history
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from #401)
  • Loading branch information
paulidale committed May 25, 2023
1 parent 9ff4394 commit 89c5c95
Showing 1 changed file with 56 additions and 28 deletions.
84 changes: 56 additions & 28 deletions news/fips-cve.md
Expand Up @@ -5,37 +5,65 @@ breadcrumb: CVEs and FIPS

After the release of OpenSSL 3.0.0, several CVEs have been identified
and resolved. While the majority of these vulnerabilities are unrelated
to the validated FIPS provider, a few of them are applicable. This table
lists all of the CVEs issued since the FIPS provider's release and their
to the validated FIPS providers, a few of them are applicable. This table
lists all of the CVEs issued since the FIPS providers' releases and their
relevance to it:


CVE ID | Fixed | FIPS? | Notes
----- | :-: | :-: | :---------------
CVE-2023-1255 | 3.0.9 | **yes** | Possible denial of service on Arm 64 (aarch64) using AES XTS mode
CVE-2023-0466 | 3.0.9 | no |
CVE-2023-0465 | 3.0.9 | no |
CVE-2023-0464 | 3.0.9 | no |
CVE-2023-0401 | 3.0.8 | no |
CVE-2023-0286 | 3.0.8 | no |
CVE-2023-0217 | 3.0.8 | **yes** | DSA public key checks (but not from TLS)
CVE-2023-0216 | 3.0.8 | no |
CVE-2023-0215 | 3.0.8 | no |
CVE-2022-4450 | 3.0.8 | no |
CVE-2022-4304 | 3.0.8 | **yes** | Timing side channel in RSA
CVE-2022-4203 | 3.0.8 | no |
CVE-2022-3996 | 3.0.8 | no |
CVE-2022-3786 | 3.0.7 | no |
CVE-2022-3602 | 3.0.7 | no |
CVE-2022-3358 | 3.0.6 | no |
CVE-2022-2274 | 3.0.5 | no | Bug introduced in 3.0.4 which isn't validated
CVE-2022-2097 | 3.0.5 | no | Architecture (x86) is not part of validation
CVE-2022-2068 | 3.0.4 | no |
CVE-2022-1473 | 3.0.3 | no |
CVE-2022-1434 | 3.0.3 | no |
CVE-2022-1343 | 3.0.3 | no |
CVE-2022-1292 | 3.0.3 | no |
CVE-2022-0778 | 3.0.2 | _maybe_ | Difficult to encounter inside FIPS boundary
CVE-2021-4160 | 3.0.1 | no | Architecture (MIPS) is not part of validation
CVE-2021-4044 | 3.0.1 | no |
[CVE-2023-1255] | 3.0.9 | **yes** | Possible denial of service on Arm 64 (aarch64) using AES XTS mode
[CVE-2023-0466] | 3.0.9 | no |
[CVE-2023-0465] | 3.0.9 | no |
[CVE-2023-0464] | 3.0.9 | no |
| | | | **Release of 3.0.8 FIPS provider**
[CVE-2023-0401] | 3.0.8 | no |
[CVE-2023-0286] | 3.0.8 | no |
[CVE-2023-0217] | 3.0.8 | **yes** | DSA public key checks (but not from TLS)
[CVE-2023-0216] | 3.0.8 | no |
[CVE-2023-0215] | 3.0.8 | no |
[CVE-2022-4450] | 3.0.8 | no |
[CVE-2022-4304] | 3.0.8 | **yes** | Timing side channel in RSA
[CVE-2022-4203] | 3.0.8 | no |
[CVE-2022-3996] | 3.0.8 | no |
[CVE-2022-3786] | 3.0.7 | no |
[CVE-2022-3602] | 3.0.7 | no |
[CVE-2022-3358] | 3.0.6 | no |
[CVE-2022-2274] | 3.0.5 | no | Bug introduced in 3.0.4 which isn't validated
[CVE-2022-2097] | 3.0.5 | no | Architecture (x86) is not part of validation
[CVE-2022-2068] | 3.0.4 | no |
[CVE-2022-1473] | 3.0.3 | no |
[CVE-2022-1434] | 3.0.3 | no |
[CVE-2022-1343] | 3.0.3 | no |
[CVE-2022-1292] | 3.0.3 | no |
[CVE-2022-0778] | 3.0.2 | _maybe_ | Difficult to encounter inside FIPS boundary
[CVE-2021-4160] | 3.0.1 | no | Architecture (MIPS) is not part of validation
[CVE-2021-4044] | 3.0.1 | no |
| | | | **Release of 3.0.0 FIPS provider**

[CVE-2023-1255]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-1255
[CVE-2023-0466]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0466
[CVE-2023-0465]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0465
[CVE-2023-0464]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0464
[CVE-2023-0401]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0401
[CVE-2023-0286]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0286
[CVE-2023-0217]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0217
[CVE-2023-0216]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0216
[CVE-2023-0215]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0215
[CVE-2022-4450]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-4450
[CVE-2022-4304]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-4304
[CVE-2022-4203]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-4203
[CVE-2022-3996]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-3996
[CVE-2022-3786]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-3786
[CVE-2022-3602]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-3602
[CVE-2022-3358]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-3358
[CVE-2022-2274]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-2274
[CVE-2022-2097]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-2097
[CVE-2022-2068]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-2068
[CVE-2022-1473]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-1473
[CVE-2022-1434]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-1434
[CVE-2022-1343]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-1343
[CVE-2022-1292]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-1292
[CVE-2022-0778]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-0778
[CVE-2021-4160]: https://www.openssl.org/news/vulnerabilities.html#CVE-2021-4160
[CVE-2021-4044]: https://www.openssl.org/news/vulnerabilities.html#CVE-2021-4044

0 comments on commit 89c5c95

Please sign in to comment.