Security
The following features, enhancements, and changes related to security are introduced in this Oracle Linux 9 release.
NSS Updated to Version 3.101
The NSS cryptographic toolkit packages are updated to version 3.101 to provide many bug fixes and enhancements, including an important fix to prevent RSA certificates with keys shorter than 2048 bits from working, in accordance with the system-wide cryptographic policy.
OpenSSL Updated to Version 3.2.2
OpenSSL is updated to version 3.2.2. This significant update includes many feature changes, security fixes, and changes.
The following notable changes are included:
-
Cryptographic operations, including ECDSA and AES-GCM-SIV, are enhanced and RSA public key handling is optimized.
-
Added functionality to handle the QUIC protocol for secure multi-stream communications over UDP. See https://github.com/openssl/openssl/blob/master/README-QUIC.md for more information. The QUIC protocol can now be used on the client side as a Technology Preview.
-
Several improvements and features are added for Certificate Management Protocol (CMP).
-
Security algorithms are added and updated including hybrid public key encryption (HPKE), Ed25519ctx, Ed25519ph, among others for increased security options.
-
The Argon2d, Argon2i, and Argon2id key derivation functions (KDF) are supported.
-
Brainpool curves have been added to the TLS 1.3 protocol (RFC 8734) but Brainpool curves remain disabled in all supported system-wide cryptographic policies.
-
TLS certificate compression is now available, including the zlib, Brotli, and zstd libraries.
-
Several patches are included for critical issues such as buffer overreads, memory leaks, and denial-of-service vulnerabilities.
-
Updates to code to align with FIPS 140-3 standards to enhance security and compliance.
-
Older functions, including LHASH statistics are deprecated.
For more information, see https://openssl-library.org/news/openssl-3.1-notes/index.html and https://openssl-library.org/news/openssl-3.2-notes/index.html.
OpenSSH Updated to Version 8.7p1-43
OpenSSH is updated to version 8.7p1-43. This update patches several critical security issues and includes performance enhancements and bug fixes.
Notably, you can now configure default key sizes for ssh host key generation. Values for
host key sizes are set in /etc/sysconfig/sshd
by uncommenting and
editing the default values:
#SSH_RSA_BITS=3072
#SSH_ECDSA_BITS=256
Trusted CA Root Certificates Added in OpenSSL directory-hash
Format
The OpenSSL hash links to trusted CA root certificates are populated in
/etc/pki/ca-trust/extracted/pem/directory-hash/
. This update
helps OpenSSL to perform certificate lookup and validation more efficiently when the
SSL_CERT_DIR
environment variable is set to the file path of the
directory-hash.
crypto-policies
Packages Updated for Java Algorithm Selection
The crypto-policies
packages are updated for algorithm selection in
Java. The update includes the following changes:
-
DTLS 1.0 is controlled by the
protocol
option, which is disabled by default. You can enable it by setting theprotocol@java = DTLS1.0+
scoped directive. -
anon
andNULL
cipher suites are controlled by setting thecipher
option, which is disabled by default. For example, set thecipher@java = NULL
scoped directive. -
The list of signature algorithms is controlled by the
sign@java
scoped directive and aligned to the system-wide defaults. You can specify algorithms for Java with asign@java = <algorithm1>+ <algorithm2>+
scoped directive. -
Elliptic curve (EC) keys smaller than 256 bits are disabled unconditionally to align with upstream guidance.
For information on interoperability see the
/etc/crypto-policies/back-ends/java.config
file.
fips-mode-setup
Checks for Use of Argon2 KDF in Open LUKS
Volumes
The fips-mode-setup
command checks open LUKS volumes for Argon2 key
derivation functions (KDF) before switching to FIPS mode, and exits if any are detected.
Argon2 KDF isn't FIPS compatible. This update helps prevent application of FIPS mode on
systems that contain volumes that aren't FIPS compliant. Change KDFs on any volumes that are
affected.
audit
Updated to Version 3.1.5
The audit
package is updated to version 3.1.5 to fix several bugs including
some fixes for memory leaks, and improvement to auparse
metrics and a manual
page update to clarify /etc/audit/audit-stop.rules
.
opencryptoki
Updated to Version 3.23.0
The opencryptoki
package is updated to version 3.23.0.
Notable changes include several bug fixes, updates to harden against RSA timing attacks, and EP11 enables FIPS-session mode.
See https://github.com/opencryptoki/opencryptoki/releases for more information.
Libreswan Updated to Version 4.15
The libreswan
packages are updated to version 4.15 to provide security
fixes and improvements.
See https://github.com/libreswan/libreswan/blob/main/CHANGES for more information.
Libreswan is also updated to resolve an issue that caused an IPsec connection to fail
when configured to use certificate-based authentication with a certificate that included
a subjectAltName
extension with an IPv6 address.
clevis
Updated to Version 20
The clevis
component that's used to automate decryption of data or LUKS
volumes is updated to version 20.
Notable changes include:
-
Uses
jose
, instead ofpwmake
, for password generation -
Several bug fixes and improvements for static analysis in LUKS and
udisks2
See https://github.com/latchset/clevis/releases/tag/v19 and https://github.com/latchset/clevis/releases/tag/v20 for more information.
jose
Updated to Version 14
The jose
package is updated to version 14. jose
is a
command line utility for performing various tasks on JSON Object Signing and Encryption
(JOSE) objects. jose
provides a full crypto stack including key
generation, signing, and encryption.
See https://github.com/latchset/jose/releases/tag/v12, https://github.com/latchset/jose/releases/tag/v13, and https://github.com/latchset/jose/releases/tag/v14 for more information.
SELinux Updates
Several significant updates are applied for SELinux in this release.
-
The
afterburn_t
,bootupd_t
,rshim_t
, andmptcpd_t
SELinux domains are updated so that the associated services run in enforcing mode. -
The
bootupd
service updates the bootloader, and therefore must be confined. Thebootupd
service runs in thebootupd_t
SELinux domain. -
The SELinux policy is updated by new rules in the
nbdkit-selinux
package to confinenbdkit
so that systems that runnbdkit
are more resilient against privilege escalation attacks. - A new SELinux policy Boolean is added to allow the QEMU guest agent to change to
the
virt_qemu_ga_unconfined_t
domain for run files in any of the following directories:-
/etc/qemu-ga/fsfreeze-hook.d/
-
/usr/libexec/qemu-ga/fsfreeze-hook.d/
-
/var/run/qemu-ga/fsfreeze-hook.d/
Enable the
virt_qemu_ga_run_unconfined
to run confined commands through the QEMU guest agent. -
SCAP Security Guide Updated to Version 0.1.74
Updates to the SCAP Security Guide include the following notable changes:
-
Enhanced coverage of draft for STIG profile in Oracle Linux 9:
-
Extended rules selection to match latest version of the draft document.
-
Completed ansible remediation coverage.
-
-
Introduced
ism_o
profile for Oracle Linux 9 systems to cover the "Information Security Manual" guidance produced by Australian Cyber Security Center.