RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1938257 - refresh OpenSSL bundled with edk2 for RHEL-8.5
Summary: refresh OpenSSL bundled with edk2 for RHEL-8.5
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: edk2
Version: 8.5
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: rc
: ---
Assignee: Laszlo Ersek
QA Contact: Xueqiang Wei
URL:
Whiteboard:
Depends On: edk2-rebase-rhel-8.5
Blocks: 1940069 1940073
TreeView+ depends on / blocked
 
Reported: 2021-03-12 15:37 UTC by Laszlo Ersek
Modified: 2021-11-09 22:12 UTC (History)
14 users (show)

Fixed In Version: edk2-20210527gite1999b264f1f-1.el8
Doc Type: Enhancement
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-11-09 18:06:53 UTC
Type: Feature Request
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:4198 0 None None None 2021-11-09 18:08:06 UTC
TianoCore 3266 0 None None None 2021-03-16 17:45:54 UTC

Description Laszlo Ersek 2021-03-12 15:37:07 UTC
After, or as a part of, rebasing downstream edk2 to edk2-stable202105 for RHEL-8.5, evaluate, with Simo's help, whether advancing the OpenSSL version, bundled with edk2, is necessary.

If so, determine the target OpenSSL dist-git commit, and refresh the bundle.

As of this writing (edk2-20200602gitca407c7246bf-4.el8), edk2 bundles RHEL8 OpenSSL at dist-git commit bdd048e929dc ("Two fixes that will be shipped in RHEL-8.3.0.z", 2020-10-23).

Comment 1 Laszlo Ersek 2021-03-16 17:45:56 UTC
Related:
Update OpenSSL version to version 1.1.1j to include CVE fix
https://bugzilla.tianocore.org/show_bug.cgi?id=3266

Comment 2 Laszlo Ersek 2021-05-21 18:28:58 UTC
Hi Simo,

The rhel-8.5.0 branch of OpenSSL dist-git currently stands at commit
9ce34d535bd9 ("Allow only curves defined in RFC 8446 in TLS 1.3",
2021-04-26).

With this version of RHEL-8 OpenSSL, edk2 builds fine (for bug 1938238
-- "rebase edk2 to edk2-stable202105 for RHEL-8.5").

For edk2, this update means the following shortlog, since the
last-consumed OpenSSL dist-git version (bdd048e929dc..9ce34d535bd9):

Daiki Ueno (2):
      Use AI_ADDRCONFIG only when explicit host name is given
      Allow only curves defined in RFC 8446 in TLS 1.3

Dmitry Belyavskiy (1):
      Remove 2-key 3DES test from FIPS_selftest

Sahana Prasad (2):
      Fix CVE-2020-1971 ediparty null pointer dereference
      Fixes CVE-2021-3450 openssl: CA certificate check bypass [...]


Can you please confirm that this OpenSSL dist-git commit (9ce34d535bd9)
is fine for edk2 to consume in RHEL-8.5.0?

Thank you,
Laszlo

Comment 3 Simo Sorce 2021-05-21 19:09:30 UTC
Lazlo,
we are planning a rebase to latest 1.1.1 in 8.5
Sahana can you provide details to Lazlo ?

Comment 4 Laszlo Ersek 2021-05-21 21:21:12 UTC
Hmmm, thanks -- dependent on the timing, I might want to run with 9ce34d535bd9 for now, and then create a new downstream edk2 patch for adopting your final OpenSSL dist-git version.

Comment 9 Yanan Fu 2021-06-24 03:38:08 UTC
QE bot(pre verify): Set 'Verified:Tested,SanityOnly' as gating/tier1 test pass.

Comment 12 Xueqiang Wei 2021-07-04 10:16:47 UTC
The openssl version is 1.1.1k in edk2-20210527gite1999b264f1f-1.el8.

# rpm -qa|grep openssl
openssl-devel-1.1.1k-1.el8.x86_64
openssl-pkcs11-0.4.10-2.el8.x86_64
openssl-1.1.1k-1.el8.x86_64
openssl-libs-1.1.1k-1.el8.x86_64



And tested edk2 test loop(like, https installation), no new bug found. So set status to VERIFIED.


Versions:
kernel-4.18.0-315.el8.x86_64
qemu-kvm-6.0.0-21.module+el8.5.0+11555+e0ab0d09
edk2-ovmf-20210527gite1999b264f1f-1.el8.noarch
openssl-1.1.1k-1.el8.x86_64

Comment 14 errata-xmlrpc 2021-11-09 18:06:53 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: edk2 security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2021:4198


Note You need to log in before you can comment on or make changes to this bug.