Bug 2074843
| Summary: | edk2: sync openssl sources with rhel openssl rpm [rhel.9.1] | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 9 | Reporter: | Gerd Hoffmann <kraxel> |
| Component: | edk2 | Assignee: | Gerd Hoffmann <kraxel> |
| Status: | CLOSED ERRATA | QA Contact: | Xueqiang Wei <xuwei> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 9.1 | CC: | berrange, coli, jinzhao, juzhang, kraxel, pbonzini, virt-maint, xuwei, yfu |
| Target Milestone: | rc | Keywords: | Triaged |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | edk2-20220526git16779ede2d36-3.el9 | Doc Type: | If docs needed, set a value |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2022-11-15 09:56:33 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2071020 | ||
| Bug Blocks: | |||
|
Description
Gerd Hoffmann
2022-04-13 08:58:01 UTC
QE bot(pre verify): Set 'Verified:Tested,SanityOnly' as gating/tier1 test pass. Tested with edk2-ovmf-20220526git16779ede2d36-3.el9.noarch, edk2 regression test passed, no new bug was found. Version: kernel-5.14.0-138.el9.x86_64 qemu-kvm-7.0.0-9.el9 edk2-ovmf-20220526git16779ede2d36-3.el9.noarch Check the openssl version in rhel-9.1 # openssl version OpenSSL 3.0.1 14 Dec 2021 (Library: OpenSSL 3.0.1 14 Dec 2021) Check the openssl version in rhel-8.7 # openssl version OpenSSL 1.1.1k FIPS 25 Mar 2021 Check the edk2 openssl tarball (openssl-rhel-740e53ace8f6771c205bf84780e26bcd7a3275df.tar.xz) The version is "OpenSSL 1.1.1k 25 Mar 2021". Based on Description, it is as expected. According to Comment 4, set status to VERIFIED. Thanks. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (edk2 bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2022:7971 |