30c6de24df- Update to 3.5.2: * Miscellaneous minor bug fixes. * The FIPS provider now performs a PCT on key import for RSA, EC and ECX. This is mandated by FIPS 140-3 IG 10.3.A additional comment 1. - Rebase patches: * openssl-FIPS-140-3-keychecks.patch * openssl-FIPS-NO-DES-support.patch * openssl-FIPS-enforce-EMS-support.patch * openssl-disable-fipsinstall.patch - Move ssl configuration files to the libopenssl package [bsc#1247463] - Don't install unneeded NOTES
devel
Pedro Monreal Gonzalez2025-08-06 13:16:19 +00:00
8a00581af4- Update to 3.5.0: * Changes: - Default encryption cipher for the req, cms, and smime applications changed from des-ede3-cbc to aes-256-cbc. - The default TLS supported groups list has been changed to include and prefer hybrid PQC KEM groups. Some practically unused groups were removed from the default list. - The default TLS keyshares have been changed to offer X25519MLKEM768 and and X25519. - All BIO_meth_get_*() functions were deprecated. * New features: - Support for server side QUIC (RFC 9000) - Support for 3rd party QUIC stacks including 0-RTT support - Support for PQC algorithms (ML-KEM, ML-DSA and SLH-DSA) - A new configuration option no-tls-deprecated-ec to disable support for TLS groups deprecated in RFC8422 - A new configuration option enable-fips-jitter to make the FIPS provider to use the JITTER seed source - Support for central key generation in CMP - Support added for opaque symmetric key objects (EVP_SKEY) - Support for multiple TLS keyshares and improved TLS key establishment group configurability - API support for pipelining in provided cipher algorithms * Remove patches: - openssl-3-disable-hmac-hw-acceleration-with-engine-digest.patch - openssl-3-support-CPACF-sha3-shake-perf-improvement.patch - openssl-3-add-defines-CPACF-funcs.patch - openssl-3-fix-memleak-s390x_HMAC_CTX_copy.patch - openssl-3-add-xof-state-handling-s3_absorb.patch - openssl-3-fix-state-handling-sha3_absorb_s390x.patchPedro Monreal Gonzalez2025-04-16 13:02:20 +00:00
a91f523eacAccepting request 1255522 from security:tlsAna Guerrero2025-03-27 21:31:30 +00:00
d801e4b1ff- Introduce --without lto. When %{optflags} contains -flto=*, tests cases are also built using -flto=* which significantly increases build times, this option disables lto which improve iteration times when developing.Pedro Monreal Gonzalez2025-03-07 08:17:54 +00:00
e992b24c38Accepting request 1245244 from security:tlsAna Guerrero2025-02-12 20:30:27 +00:00
8853ae0bcfAccepting request 1234617 from security:tlsAna Guerrero2025-01-05 14:27:00 +00:00
b062a1d507- Add support for userspace livepatching on ppc64le (jsc#PED-11850). - Fix evp_properties section in the openssl.cnf file [bsc#1234647] * Rebase patches: - openssl-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch - openssl-TESTS-Disable-default-provider-crypto-policies.patchPedro Monreal Gonzalez2025-01-02 18:17:13 +00:00
5afc4138ca- Add support for userspace livepatching on ppc64le (jsc#PED-10952). - Use gcc-13 for ppc64le.Pedro Monreal Gonzalez2025-01-02 08:25:49 +00:00
b3fd9c08d5Accepting request 1223748 from security:tlsAna Guerrero2024-11-13 14:26:48 +00:00
dcc7abb986Accepting request 1217013 from security:tlsAna Guerrero2024-10-29 13:32:23 +00:00
6e95485a74- Update to 3.1.7: * Major changes between OpenSSL 3.1.6 and OpenSSL 3.1.7 [3 Sep 2024] - Fixed possible denial of service in X.509 name checks (CVE-2024-6119) - Fixed possible buffer overread in SSL_select_next_proto() (CVE-2024-5535) * Major changes between OpenSSL 3.1.5 and OpenSSL 3.1.6 [4 Jun 2024] - Fixed potential use after free after SSL_free_buffers() is called (CVE-2024-4741) - Fixed an issue where checking excessively long DSA keys or parameters may be very slow (CVE-2024-4603) - Fixed unbounded memory growth with session handling in TLSv1.3 (CVE-2024-2511) * Major changes between OpenSSL 3.1.4 and OpenSSL 3.1.5 [30 Jan 2024] - Fixed PKCS12 Decoding crashes (CVE-2024-0727) - Fixed Excessive time spent checking invalid RSA public keys [CVE-2023-6237) - Fixed POLY1305 MAC implementation corrupting vector registers on PowerPC CPUs which support PowerISA 2.07 (CVE-2023-6129) - Fix excessive time spent in DH check / generation with large Q parameter value (CVE-2023-5678) * Update openssl.keyring with BA5473A2B0587B07FB27CF2D216094DFD0CB81EF * Rebase patches: - openssl-Force-FIPS.patch - openssl-FIPS-embed-hmac.patch - openssl-FIPS-services-minimize.patch - openssl-FIPS-RSA-disable-shake.patch - openssl-CVE-2023-50782.patch * Remove patches fixed in the update: - openssl-Improve-performance-for-6x-unrolling-with-vpermxor-i.patch - openssl-CVE-2024-6119.patch openssl-CVE-2024-5535.patchPedro Monreal Gonzalez2024-10-22 12:02:36 +00:00
f15b6cf3beAccepting request 1208827 from security:tlsAna Guerrero2024-10-20 08:02:58 +00:00
0ed017ed4cAccepting request 1202944 from security:tlsAna Guerrero2024-09-25 19:51:14 +00:00
e20eeb46a1- Security fix: [bsc#1230698, CVE-2024-41996] * Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used * Added openssl-CVE-2024-41996.patchPedro Monreal Gonzalez2024-09-24 12:22:05 +00:00
625347398cAccepting request 1198659 from security:tlsAna Guerrero2024-09-05 13:45:58 +00:00
b76e72dd67- Security fix: [bsc#1229465, CVE-2024-6119] * possible denial of service in X.509 name checks * openssl-CVE-2024-6119.patchPedro Monreal Gonzalez2024-09-04 08:01:42 +00:00
6bc57d937f- FIPS: Deny SHA-1 signature verification in FIPS provider [bsc#1221365] * SHA-1 is not allowed anymore in FIPS 186-5 for signature verification operations. After 12/31/2030, NIST will disallow SHA-1 for all of its usages. * Add openssl-3-FIPS-Deny-SHA-1-sigver-in-FIPS-provider.patchPedro Monreal Gonzalez2024-08-07 21:54:42 +00:00