Description
openssl: X.400 address type confusion in X.509 GeneralName.
openssl: read buffer overflow in X.509 certificate verification.
openssl: timing attack in RSA Decryption implementation.
openssl: double free after calling PEM_read_bio_ex.
openssl: use-after-free following BIO_new_NDEF.
openssl: invalid pointer dereference in d2i_PKCS7 functions.
openssl: NULL dereference validating DSA public key.
openssl: NULL dereference during PKCS7 data verification.
HMAC generation should reject key lengths < 112 bits or provide an indicator in FIPS mode (BZ#2144001).
In FIPS mode, openssl should set a minimum length for passwords in PBKDF2 (BZ#2144004).
stunnel consumes high amount of memory when pestered with TCP connections without a TLS handshake (BZ#2144009).
In FIPS mode, openssl should reject SHAKE as digest for RSA-OAEP or provide an indicator (BZ#2144011).
In FIPS mode, openssl should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator (BZ#2144013).
In FIPS mode, openssl should reject RSA signatures with X9.31 padding, or provide an indicator (BZ#2144016).
In FIPS mode, openssl should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 (BZ#2144018).
In FIPS mode, openssl should reject KDF input and output key lengths < 112 bits or provide an indicator (BZ#2144020).
In FIPS mode, openssl should reject RSA keys < 2048 bits when using EVP_PKEY_decapsulate, or provide an indicator (BZ#2145171).
OpenSSL FIPS checksum code needs update (BZ#2158413).