Security
The following features, enhancements, and changes related to security are introduced in this Oracle Linux 9 release.
NSS Updated to Version 3.101
The NSS cryptographic toolkit packages are updated to version 3.101 to provide many bug fixes and enhancements, including an important fix to prevent RSA certificates with keys shorter than 2048 bits from working, in accordance with the system-wide cryptographic policy.
OpenSSL Updated to Version 3.2.2
OpenSSL is updated to version 3.2.2. This significant update includes many feature changes, security fixes, and changes.
The following notable changes are included:
-
Cryptographic operations, including ECDSA and AES-GCM-SIV, are enhanced and RSA public key handling is optimized.
-
Added functionality to handle the QUIC protocol for secure multi-stream communications over UDP. See https://github.com/openssl/openssl/blob/master/README-QUIC.md for more information. The QUIC protocol can now be used on the client side as a Technology Preview.
-
Several improvements and features are added for Certificate Management Protocol (CMP).
-
Security algorithms are added and updated including hybrid public key encryption (HPKE), Ed25519ctx, Ed25519ph, among others for increased security options.
-
The Argon2d, Argon2i, and Argon2id key derivation functions (KDF) are supported.
-
Brainpool curves have been added to the TLS 1.3 protocol (RFC 8734) but Brainpool curves remain disabled in all supported system-wide cryptographic policies.
-
TLS certificate compression is now available, including the zlib, Brotli, and zstd libraries.
-
Several patches are included for critical issues such as buffer overreads, memory leaks, and denial-of-service vulnerabilities.
-
Updates to code to align with FIPS 140-3 standards to enhance security and compliance.
-
Older functions, including LHASH statistics are deprecated.
For more information, see https://openssl-library.org/news/openssl-3.1-notes/index.html and https://openssl-library.org/news/openssl-3.2-notes/index.html.
OpenSSH Updated to Version 8.7p1-43
OpenSSH is updated to version 8.7p1-43. This update patches several critical security issues and includes performance enhancements and bug fixes.
Notably, you can now configure default key sizes for ssh host key generation. Values for
host key sizes are set in /etc/sysconfig/sshd by uncommenting and
editing the default values:
#SSH_RSA_BITS=3072
#SSH_ECDSA_BITS=256
Trusted CA Root Certificates Added in OpenSSL directory-hash
Format
The OpenSSL hash links to trusted CA root certificates are populated in
/etc/pki/ca-trust/extracted/pem/directory-hash/. This update
helps OpenSSL to perform certificate lookup and validation more efficiently when the
SSL_CERT_DIR environment variable is set to the file path of the
directory-hash.
crypto-policies Packages Updated for Java Algorithm Selection
The crypto-policies packages are updated for algorithm selection in
Java. The update includes the following changes:
-
DTLS 1.0 is controlled by the
protocoloption, which is disabled by default. You can enable it by setting theprotocol@java = DTLS1.0+scoped directive. -
anonandNULLcipher suites are controlled by setting thecipheroption, which is disabled by default. For example, set thecipher@java = NULLscoped directive. -
The list of signature algorithms is controlled by the
sign@javascoped directive and aligned to the system-wide defaults. You can specify algorithms for Java with asign@java = <algorithm1>+ <algorithm2>+scoped directive. -
Elliptic curve (EC) keys smaller than 256 bits are disabled unconditionally to align with upstream guidance.
For information on interoperability see the
/etc/crypto-policies/back-ends/java.config file.
fips-mode-setup Checks for Use of Argon2 KDF in Open LUKS
Volumes
The fips-mode-setup command checks open LUKS volumes for Argon2 key
derivation functions (KDF) before switching to FIPS mode, and exits if any are detected.
Argon2 KDF isn't FIPS compatible. This update helps prevent application of FIPS mode on
systems that contain volumes that aren't FIPS compliant. Change KDFs on any volumes that are
affected.
audit Updated to Version 3.1.5
The audit package is updated to version 3.1.5 to fix several bugs including
some fixes for memory leaks, and improvement to auparse metrics and a manual
page update to clarify /etc/audit/audit-stop.rules.
opencryptoki Updated to Version 3.23.0
The opencryptoki package is updated to version 3.23.0.
Notable changes include several bug fixes, updates to harden against RSA timing attacks, and EP11 enables FIPS-session mode.
See https://github.com/opencryptoki/opencryptoki/releases for more information.
Libreswan Updated to Version 4.15
The libreswan packages are updated to version 4.15 to provide security
fixes and improvements.
See https://github.com/libreswan/libreswan/blob/main/CHANGES for more information.
Libreswan is also updated to resolve an issue that caused an IPsec connection to fail
when configured to use certificate-based authentication with a certificate that included
a subjectAltName extension with an IPv6 address.
clevis Updated to Version 20
The clevis component that's used to automate decryption of data or LUKS
volumes is updated to version 20.
Notable changes include:
-
Uses
jose, instead ofpwmake, for password generation -
Several bug fixes and improvements for static analysis in LUKS and
udisks2
See https://github.com/latchset/clevis/releases/tag/v19 and https://github.com/latchset/clevis/releases/tag/v20 for more information.
jose Updated to Version 14
The jose package is updated to version 14. jose is a
command line utility for performing various tasks on JSON Object Signing and Encryption
(JOSE) objects. jose provides a full crypto stack including key
generation, signing, and encryption.
See https://github.com/latchset/jose/releases/tag/v12, https://github.com/latchset/jose/releases/tag/v13, and https://github.com/latchset/jose/releases/tag/v14 for more information.
SELinux Updates
Several significant updates are applied for SELinux in this release.
-
The
afterburn_t,bootupd_t,rshim_t, andmptcpd_tSELinux domains are updated so that the associated services run in enforcing mode. -
The
bootupdservice updates the bootloader, and therefore must be confined. Thebootupdservice runs in thebootupd_tSELinux domain. -
The SELinux policy is updated by new rules in the
nbdkit-selinuxpackage to confinenbdkitso that systems that runnbdkitare more resilient against privilege escalation attacks. - A new SELinux policy Boolean is added to allow the QEMU guest agent to change to
the
virt_qemu_ga_unconfined_tdomain for run files in any of the following directories:-
/etc/qemu-ga/fsfreeze-hook.d/ -
/usr/libexec/qemu-ga/fsfreeze-hook.d/ -
/var/run/qemu-ga/fsfreeze-hook.d/
Enable the
virt_qemu_ga_run_unconfinedto run confined commands through the QEMU guest agent. -
SCAP Security Guide Updated to Version 0.1.74
Updates to the SCAP Security Guide include the following notable changes:
-
Enhanced coverage of draft for STIG profile in Oracle Linux 9:
-
Extended rules selection to match latest version of the draft document.
-
Completed ansible remediation coverage.
-
-
Introduced
ism_oprofile for Oracle Linux 9 systems to cover the "Information Security Manual" guidance produced by Australian Cyber Security Center.