105 Commits

Author SHA256 Message Date
d8a068a06d Accepting request 1151504 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1151504
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=43
2024-02-26 18:58:45 +00:00
0eb591bfea Accepting request 1151377 from home:dimstar:rpm4.20:o
Prepare for RPM 4.20

OBS-URL: https://build.opensuse.org/request/show/1151377
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=101
2024-02-26 13:12:44 +00:00
246f062d75 Accepting request 1144563 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1144563
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=42
2024-02-06 15:35:53 +00:00
Otto Hollmann
cc37dae54b Accepting request 1144517 from home:ohollmann:branches:security:tls
- Security fix: [bsc#1219243, CVE-2024-0727]
  * Add NULL checks where ContentInfo data can be NULL
  * Add openssl-CVE-2024-0727.patch

OBS-URL: https://build.opensuse.org/request/show/1144517
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=99
2024-02-06 12:43:16 +00:00
1ba1fe16e0 Accepting request 1126788 from security:tls
- Security fix: [bsc#1216922, CVE-2023-5678]
  * Fix excessive time spent in DH check / generation with large Q
    parameter value.
  * Applications that use the functions DH_generate_key() to generate
    an X9.42 DH key may experience long delays. Likewise,
    applications that use DH_check_pub_key(), DH_check_pub_key_ex
    () or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42
    DH parameters may experience long delays. Where the key or
    parameters that are being checked have been obtained from an
    untrusted source this may lead to a Denial of Service.
  * Add openssl-CVE-2023-5678.patch

OBS-URL: https://build.opensuse.org/request/show/1126788
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=41
2023-11-16 19:28:38 +00:00
Otto Hollmann
ef42674c37 Accepting request 1126076 from home:ohollmann:branches:security:tls
- Security fix: [bsc#1216922, CVE-2023-5678]
  * Fix excessive time spent in DH check / generation with large Q
    parameter value.
  * Applications that use the functions DH_generate_key() to generate
    an X9.42 DH key may experience long delays. Likewise,
    applications that use DH_check_pub_key(), DH_check_pub_key_ex
    () or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42
    DH parameters may experience long delays. Where the key or
    parameters that are being checked have been obtained from an
    untrusted source this may lead to a Denial of Service.
  * Add openssl-CVE-2023-5678.patch

OBS-URL: https://build.opensuse.org/request/show/1126076
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=97
2023-11-15 09:54:05 +00:00
ecb0c2fec4 Accepting request 1102939 from security:tls
- Security fix: (bsc#1213853, CVE-2023-3817)
  * Fix excessive time spent checking DH q parameter value
    (bsc#1213853, CVE-2023-3817). The function DH_check() performs
    various checks on DH parameters. After fixing CVE-2023-3446 it
    was discovered that a large q parameter value can also trigger
    an overly long computation during some of these checks. A
    correct q value, if present, cannot be larger than the modulus
    p parameter, thus it is unnecessary to perform these checks if
    q is larger than p. If DH_check() is called with such q parameter
    value, DH_CHECK_INVALID_Q_VALUE return flag is set and the
    computationally intensive checks are skipped.
  * Add openssl-1_0-CVE-2023-3817.patch

OBS-URL: https://build.opensuse.org/request/show/1102939
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=40
2023-08-08 15:25:58 +00:00
Otto Hollmann
191696a10e Accepting request 1102830 from home:ohollmann:branches:security:tls
- Security fix: (bsc#1213853, CVE-2023-3817)
  * Fix excessive time spent checking DH q parameter value
    (bsc#1213853, CVE-2023-3817). The function DH_check() performs
    various checks on DH parameters. After fixing CVE-2023-3446 it
    was discovered that a large q parameter value can also trigger
    an overly long computation during some of these checks. A
    correct q value, if present, cannot be larger than the modulus
    p parameter, thus it is unnecessary to perform these checks if
    q is larger than p. If DH_check() is called with such q parameter
    value, DH_CHECK_INVALID_Q_VALUE return flag is set and the
    computationally intensive checks are skipped.
  * Add openssl-1_0-CVE-2023-3817.patch

OBS-URL: https://build.opensuse.org/request/show/1102830
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=94
2023-08-08 11:55:38 +00:00
4ab396faa2 Accepting request 1099702 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1099702
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=39
2023-07-25 09:49:47 +00:00
0dd569af6b Accepting request 1099701 from home:pmonrealgonzalez:branches:security:tls
- Security fix: [bsc#1213487, CVE-2023-3446]
  * Fix DH_check() excessive time with over sized modulus.
  * The function DH_check() performs various checks on DH parameters.
    One of those checks confirms that the modulus ("p" parameter) is
    not too large. Trying to use a very large modulus is slow and
    OpenSSL will not normally use a modulus which is over 10,000 bits
    in length.
    However the DH_check() function checks numerous aspects of the
    key or parameters that have been supplied. Some of those checks
    use the supplied modulus value even if it has already been found
    to be too large.
    A new limit has been added to DH_check of 32,768 bits. Supplying
    a key/parameters with a modulus over this size will simply cause
    DH_check() to fail.
  * Add openssl-CVE-2023-3446.patch

OBS-URL: https://build.opensuse.org/request/show/1099701
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=93
2023-07-20 09:50:06 +00:00
e9de30dd3d Accepting request 1095763 from security:tls
Reintroduce change, sync with openssl 3.0

OBS-URL: https://build.opensuse.org/request/show/1095763
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=38
2023-06-29 15:27:52 +00:00
ad524a1e49 Revert; change needs to be synced with openssl 3.0 update
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=37
2023-06-28 08:21:35 +00:00
1705cbb29c Accepting request 1095610 from security:tls
- Improve cross-package provides/conflicts [boo#1210313]
  * Remove Conflicts: ssl
  * Add Conflicts: openssl(cli)

- Security Fix: [bsc#1207534, CVE-2022-4304]
  * Reworked the Fix for the Timing Oracle in RSA Decryption
    The previous fix for this timing side channel turned out to cause
    a severe 2-3x performance regression in the typical use case
    compared to 1.1.1s.
  * Reworked openssl-CVE-2022-4304.patch
  * Refreshed patches:
    - openssl-CVE-2023-0286.patch
    - openssl-CVE-2023-0464.patch
    - openssl-CVE-2023-0465.patch

OBS-URL: https://build.opensuse.org/request/show/1095610
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=36
2023-06-27 21:17:51 +00:00
Otto Hollmann
f587116db0 Accepting request 1094356 from security:tls:unstable
- Improve cross-package provides/conflicts [boo#1210313]
  * Remove Conflicts: ssl
  * Add Conflicts: openssl(cli)

- Security Fix: [bsc#1207534, CVE-2022-4304]
  * Reworked the Fix for the Timing Oracle in RSA Decryption
    The previous fix for this timing side channel turned out to cause
    a severe 2-3x performance regression in the typical use case
    compared to 1.1.1s.
  * Reworked openssl-CVE-2022-4304.patch
  * Refreshed patches:
    - openssl-CVE-2023-0286.patch
    - openssl-CVE-2023-0464.patch
    - openssl-CVE-2023-0465.patch

OBS-URL: https://build.opensuse.org/request/show/1094356
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=90
2023-06-21 13:09:16 +00:00
dc5c3d77a6 Accepting request 1090920 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1090920
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=35
2023-06-07 21:06:42 +00:00
26e406913d Accepting request 1090918 from security:tls:unstable
OBS-URL: https://build.opensuse.org/request/show/1090918
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=88
2023-06-05 13:11:49 +00:00
db7117d4ac Accepting request 1090888 from security:tls:unstable
OBS-URL: https://build.opensuse.org/request/show/1090888
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=87
2023-06-05 11:27:35 +00:00
125d575d48 Accepting request 1089985 from security:tls
- Security Fix: [CVE-2023-2650, bsc#1211430]
  * Possible DoS translating ASN.1 object identifiers
  * Add openssl-CVE-2023-2650.patch

OBS-URL: https://build.opensuse.org/request/show/1089985
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=34
2023-05-31 19:54:58 +00:00
Otto Hollmann
a5da13a38f Accepting request 1089975 from home:ohollmann:branches:security:tls
- Security Fix: [CVE-2023-2650, bsc#1211430]
  * Possible DoS translating ASN.1 object identifiers
  * Add openssl-CVE-2023-2650.patch

OBS-URL: https://build.opensuse.org/request/show/1089975
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=85
2023-05-31 09:45:39 +00:00
47ab436905 Accepting request 1077222 from security:tls
- Security Fix: [CVE-2023-0465, bsc#1209878]
  * Invalid certificate policies in leaf certificates are silently ignored
  * Add openssl-CVE-2023-0465.patch
- Security Fix: [CVE-2023-0466, bsc#1209873]
  * Certificate policy check not enabled
  * Add openssl-CVE-2023-0466.patch

OBS-URL: https://build.opensuse.org/request/show/1077222
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=33
2023-04-04 19:27:23 +00:00
Otto Hollmann
c80ea096bf Accepting request 1077205 from home:ohollmann:branches:security:tls
- Security Fix: [CVE-2023-0465, bsc#1209878]
  * Invalid certificate policies in leaf certificates are silently ignored
  * Add openssl-CVE-2023-0465.patch
- Security Fix: [CVE-2023-0466, bsc#1209873]
  * Certificate policy check not enabled
  * Add openssl-CVE-2023-0466.patch

OBS-URL: https://build.opensuse.org/request/show/1077205
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=83
2023-04-04 12:55:08 +00:00
18c5c425df Accepting request 1074723 from security:tls
- Security Fix: [CVE-2023-0464, bsc#1209624]
  * Excessive Resource Usage Verifying X.509 Policy Constraints
  * Add openssl-CVE-2023-0464.patch

- Pass over with spec-cleaner

OBS-URL: https://build.opensuse.org/request/show/1074723
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=32
2023-03-29 21:26:48 +00:00
Otto Hollmann
deef49b7db Accepting request 1074695 from home:ohollmann:branches:security:tls
- Security Fix: [CVE-2023-0464, bsc#1209624]
  * Excessive Resource Usage Verifying X.509 Policy Constraints
  * Add openssl-CVE-2023-0464.patch

- Pass over with spec-cleaner

OBS-URL: https://build.opensuse.org/request/show/1074695
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=81
2023-03-27 14:37:58 +00:00
52ec707ccb Accepting request 1066748 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1066748
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=31
2023-02-21 14:35:34 +00:00
Otto Hollmann
bdccbade34 Accepting request 1066745 from home:ohollmann:branches:security:tls
- Fix DH key generation in FIPS mode, add support for constant BN for
  DH parameters [bsc#1202062]
  * Add patch: openssl-fips_fix_DH_key_generation.patch

OBS-URL: https://build.opensuse.org/request/show/1066745
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=79
2023-02-20 09:21:43 +00:00
527ea783c1 Accepting request 1063738 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1063738
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=30
2023-02-14 15:44:43 +00:00
ff5a175839 Accepting request 1063664 from home:ohollmann:branches:security:tls
- Security Fix: [bsc#1207533, CVE-2023-0286]
  * Fix X.400 address type confusion in X.509 GENERAL_NAME_cmp
    for x400Address
  * Add openssl-CVE-2023-0286.patch
- Security Fix: [bsc#1207536, CVE-2023-0215]
  * Use-after-free following BIO_new_NDEF()
  * Add patches:
    - openssl-CVE-2023-0215-1of4.patch
    - openssl-CVE-2023-0215-3of4.patch
    - openssl-CVE-2023-0215-4of4.patch
- Security Fix: [bsc#1207534, CVE-2022-4304]
  * Timing Oracle in RSA Decryption
  * Add openssl-CVE-2022-4304.patch
- Security Fix: [bsc#1179491, CVE-2020-1971]
  * Fix EDIPARTYNAME NULL pointer dereference
  * Add openssl-CVE-2020-1971.patch

OBS-URL: https://build.opensuse.org/request/show/1063664
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=77
2023-02-08 08:07:32 +00:00
430e96538f Accepting request 1046230 from security:tls
- Update further expiring certificates that affect tests [bsc#1201627]
  * Add openssl-Update-further-expiring-certificates.patch

OBS-URL: https://build.opensuse.org/request/show/1046230
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=29
2023-01-03 14:04:23 +00:00
Otto Hollmann
443ffe72d6 Accepting request 1046151 from home:ohollmann:branches:security:tls
- Update further expiring certificates that affect tests [bsc#1201627]
  * Add openssl-Update-further-expiring-certificates.patch

OBS-URL: https://build.opensuse.org/request/show/1046151
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=75
2023-01-02 15:13:13 +00:00
d0f1a4891b Accepting request 1007225 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1007225
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=28
2022-10-01 15:41:29 +00:00
b9c6e6740d Accepting request 1005897 from home:jsikes:branches:security:tls
Finally fixed bsc-1180995. Enjoy!

OBS-URL: https://build.opensuse.org/request/show/1005897
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=73
2022-09-30 10:26:51 +00:00
a0d1b8b17d Accepting request 987303 from security:tls
OBS-URL: https://build.opensuse.org/request/show/987303
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=27
2022-07-08 12:01:32 +00:00
Jason Sikes
847aa78649 Accepting request 985765 from home:Andreas_Schwab:Factory
- openssl-riscv64-config.patch: backport of riscv64 config support

OBS-URL: https://build.opensuse.org/request/show/985765
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=71
2022-07-07 02:47:07 +00:00
2d9c47d31d Accepting request 985240 from home:jsikes:branches:security:tls
Uncommented Patch88. Enjoy!

OBS-URL: https://build.opensuse.org/request/show/985240
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=70
2022-07-06 11:24:26 +00:00
Jason Sikes
c609aac906 Accepting request 984184 from home:jengelh:branches:security:tls
- Adjust rpmlintrc to apply to all arches.

OBS-URL: https://build.opensuse.org/request/show/984184
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=69
2022-06-23 04:42:55 +00:00
6ad029ec4d Accepting request 977471 from security:tls
OBS-URL: https://build.opensuse.org/request/show/977471
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=26
2022-05-17 15:23:42 +00:00
1ec9aebdb7 Accepting request 976996 from home:jengelh:branches:security:tls
- Add an rpmlintrc for shlib-policy-name-error/multibuild case.

OBS-URL: https://build.opensuse.org/request/show/976996
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=67
2022-05-16 08:30:34 +00:00
340cbb8884 Accepting request 971746 from security:tls
OBS-URL: https://build.opensuse.org/request/show/971746
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=25
2022-04-22 22:25:11 +00:00
Jason Sikes
4b0e9a84d9 Accepting request 971360 from home:dirkmueller:Factory
- update openssl-fips_cavs_aes_keywrap.patch to avoid
  (nonexploitable) format-string vulnerability

OBS-URL: https://build.opensuse.org/request/show/971360
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=65
2022-04-21 12:22:57 +00:00
5b6129f21c Accepting request 917073 from security:tls
OBS-URL: https://build.opensuse.org/request/show/917073
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=24
2021-09-08 19:36:30 +00:00
4160669ad4 Accepting request 915323 from home:jsikes:branches:security:tls
The rest of CVE-2021-3712. Enjoy!

OBS-URL: https://build.opensuse.org/request/show/915323
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=64
2021-09-06 10:52:51 +00:00
2b6be00a59 Accepting request 906783 from security:tls
OBS-URL: https://build.opensuse.org/request/show/906783
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=23
2021-07-21 17:05:33 +00:00
07b3cf8aa8 Accepting request 906748 from home:jsikes:branches:security:tls
New candidate fix. Enjoy!

OBS-URL: https://build.opensuse.org/request/show/906748
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=63
2021-07-17 07:23:01 +00:00
b9fb012505 Accepting request 877749 from security:tls
OBS-URL: https://build.opensuse.org/request/show/877749
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=22
2021-03-12 12:31:22 +00:00
Jason Sikes
9018f7d700 Accepting request 876957 from home:pmonrealgonzalez:branches:security:tls
- Security fixes:
  * Integer overflow in CipherUpdate: Incorrect SSLv2 rollback
    protection [bsc#1182333, CVE-2021-23840]
  * Null pointer deref in X509_issuer_and_serial_hash()
    [bsc#1182331, CVE-2021-23841]
- Add openssl-CVE-2021-23840.patch openssl-CVE-2021-23841.patch

OBS-URL: https://build.opensuse.org/request/show/876957
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=61
2021-03-08 14:23:20 +00:00
27d49b131e Accepting request 841378 from security:tls
OBS-URL: https://build.opensuse.org/request/show/841378
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=21
2020-10-15 11:44:42 +00:00
Tomáš Chvátal
04a05ee906 Accepting request 841316 from home:dimstar:Factory
- Escape rpm command %%expand when used in comment.

Fix build with RPM 4.16

OBS-URL: https://build.opensuse.org/request/show/841316
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=59
2020-10-13 05:13:39 +00:00
7eb89e46f1 Accepting request 831068 from security:tls
OBS-URL: https://build.opensuse.org/request/show/831068
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=20
2020-09-04 08:53:56 +00:00
Vítězslav Čížek
5ddb83579e Accepting request 828883 from home:alarrosa:branches:security:tls
- Add libopenssl10 package with libcrypto.so.10 and libssl.so.10
  libraries built with --default-symver and the following patch
  so we can provide the same symbols as other distros in a
  compatible package (bsc#1175429):
  * openssl-1.0.2e-rpmbuild.patch
- Update patch to add OPENSSL_1.0.1_EC symbol (bsc#1175429):
  * openssl-1.0.0-version.patch

OBS-URL: https://build.opensuse.org/request/show/828883
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_0_0?expand=0&rev=57
2020-09-01 11:52:29 +00:00
59444ed5eb Accepting request 758656 from security:tls
OBS-URL: https://build.opensuse.org/request/show/758656
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_0_0?expand=0&rev=19
2019-12-24 13:29:38 +00:00