-
Bug
-
Resolution: Done-Errata
-
Major
-
rhel-9.4
-
openssl-3.0.7-25.el9
-
None
-
Moderate
-
ZStream
-
2
-
rhel-sst-security-crypto
-
ssg_security
-
20
-
24
-
1
-
QE ack
-
False
-
-
No
-
CentOS Stream
-
Crypto24Q1, Crypto23Q4
-
Approved Blocker
-
-
Pass
-
Automated
-
Release Note Not Required
-
-
x86_64
-
None
What were you trying to do that didn't work?
RSA-OAEP in OpenSSL currently ships with an explicit indicator that marks it as not approved (see prior discussion in FIPS-78 for the rationale).
After clarification with CMVP, we can now drop this indicator and mark RSA-OAEP as approved. Additionally, we will need to backport https://github.com/openssl/openssl/pull/22403 to fulfill the requirements of NIST SP 800-56Br2.
Please provide the package NVR for which bug is seen:
openssl-3.0.7-17.el9_2
How reproducible:
Run attached reproducer.
Steps to reproduce
- $(head -1 rsa-enc.c | sed -E 's@^// @@g')
- ./rsa-enc 2048
Expected results
encrypt OK (indicator: approved) decrypt OK (indicator: approved)
Actual results
encrypt OK (indicator: unapproved) decrypt OK (indicator: unapproved)
- links to
-
RHBA-2023:124119 openssl bug fix and enhancement update
- mentioned on