Skip to content

Commit 9ff4394

Browse files
committed
Add page describing CVEs and their impact on the FIPS provider.
Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Hugo Landau <[email protected]>
1 parent 288e140 commit 9ff4394

File tree

4 files changed

+56
-3
lines changed

4 files changed

+56
-3
lines changed

news/dirdata.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,5 +8,6 @@ sidebar:
88
99
- [Newslog](newslog.html)
1010
- [Vulnerabilities](vulnerabilities.html)
11+
- [CVEs and FIPS](fips-cve.html)
1112
- [Changelog](changelog.html)
1213
---

news/fips-cve.md

Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
---
2+
breadcrumb: CVEs and FIPS
3+
---
4+
# CVEs and the FIPS provider
5+
6+
After the release of OpenSSL 3.0.0, several CVEs have been identified
7+
and resolved. While the majority of these vulnerabilities are unrelated
8+
to the validated FIPS provider, a few of them are applicable. This table
9+
lists all of the CVEs issued since the FIPS provider's release and their
10+
relevance to it:
11+
12+
13+
CVE ID | Fixed | FIPS? | Notes
14+
----- | :-: | :-: | :---------------
15+
CVE-2023-1255 | 3.0.9 | **yes** | Possible denial of service on Arm 64 (aarch64) using AES XTS mode
16+
CVE-2023-0466 | 3.0.9 | no |
17+
CVE-2023-0465 | 3.0.9 | no |
18+
CVE-2023-0464 | 3.0.9 | no |
19+
CVE-2023-0401 | 3.0.8 | no |
20+
CVE-2023-0286 | 3.0.8 | no |
21+
CVE-2023-0217 | 3.0.8 | **yes** | DSA public key checks (but not from TLS)
22+
CVE-2023-0216 | 3.0.8 | no |
23+
CVE-2023-0215 | 3.0.8 | no |
24+
CVE-2022-4450 | 3.0.8 | no |
25+
CVE-2022-4304 | 3.0.8 | **yes** | Timing side channel in RSA
26+
CVE-2022-4203 | 3.0.8 | no |
27+
CVE-2022-3996 | 3.0.8 | no |
28+
CVE-2022-3786 | 3.0.7 | no |
29+
CVE-2022-3602 | 3.0.7 | no |
30+
CVE-2022-3358 | 3.0.6 | no |
31+
CVE-2022-2274 | 3.0.5 | no | Bug introduced in 3.0.4 which isn't validated
32+
CVE-2022-2097 | 3.0.5 | no | Architecture (x86) is not part of validation
33+
CVE-2022-2068 | 3.0.4 | no |
34+
CVE-2022-1473 | 3.0.3 | no |
35+
CVE-2022-1434 | 3.0.3 | no |
36+
CVE-2022-1343 | 3.0.3 | no |
37+
CVE-2022-1292 | 3.0.3 | no |
38+
CVE-2022-0778 | 3.0.2 | _maybe_ | Difficult to encounter inside FIPS boundary
39+
CVE-2021-4160 | 3.0.1 | no | Architecture (MIPS) is not part of validation
40+
CVE-2021-4044 | 3.0.1 | no |
41+

news/index.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,5 +12,8 @@ If you think you have found a security bug, or want to look at all the
1212
vulnerabilities we have published and fixed, visit the
1313
[Vulnerabilities](vulnerabilities.html) page.
1414

15+
For a list of CVEs and their impact on the FIPS provider, visit the
16+
[CVEs and FIPS](fips-cve.html) page.
17+
1518
We have an online copy of our [Changelog](changelog.html). It is also
1619
part of the distribution.

source/index.md

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,10 +24,18 @@ to 3.1 or 3.0 as soon as possible. Extended support for 1.0.2 to gain access to
2424
security fixes for that version is [available](/support/contracts.html).
2525

2626

27-
The following OpenSSL version(s) are FIPS validated.
27+
The following OpenSSL version(s) are FIPS validated:
2828

29-
OpenSSL 3.0.0. Refer to the [Certificate](https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4282)
30-
and [Security Policy](https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/security-policies/140sp4282.pdf)
29+
&nbsp;OpenSSL Version&nbsp; | &nbsp;Certificate&nbsp; | &nbsp;Security Policy&nbsp;
30+
:-: | :-: | :-:
31+
3.0.0 | [certificate][cert 3.0.0] | [security policy][secpol 3.0.0]
32+
33+
[cert 3.0.0]: https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4282
34+
[secpol 3.0.0]: https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/security-policies/140sp4282.pdf
35+
36+
<br>
37+
For a list of CVEs and their impact on validated FIPS providers, visit the
38+
[CVEs and FIPS](/news/fips-cve.html) page.
3139

3240
Please follow the Security Policy instructions to download, build and
3341
install a validated OpenSSL FIPS provider.

0 commit comments

Comments
 (0)