Commit Graph

209 Commits

Author SHA256 Message Date
Vítězslav Čížek
9956f6eae8 Accepting request 787238 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1e release

OBS-URL: https://build.opensuse.org/request/show/787238
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=28
2020-03-22 11:19:18 +00:00
Dominique Leuenberger
7890860f65 Accepting request 753239 from security:tls
OBS-URL: https://build.opensuse.org/request/show/753239
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=148
2019-12-07 14:13:41 +00:00
Tomáš Chvátal
5605777932 Accepting request 753234 from home:dimstar:Factory
Fix build in Staging:N with RPM 4.15

OBS-URL: https://build.opensuse.org/request/show/753234
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=27
2019-12-03 13:04:43 +00:00
Dominique Leuenberger
e5c610f06b Accepting request 730207 from security:tls
OBS-URL: https://build.opensuse.org/request/show/730207
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=147
2019-11-20 12:42:24 +00:00
101b1f684e Accepting request 730186 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1d release

OBS-URL: https://build.opensuse.org/request/show/730186
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=26
2019-09-11 15:32:19 +00:00
Dominique Leuenberger
4cdb995447 Accepting request 706515 from security:tls
OBS-URL: https://build.opensuse.org/request/show/706515
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=146
2019-06-18 12:44:27 +00:00
Tomáš Chvátal
a4b427864c Accepting request 706514 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1c release

OBS-URL: https://build.opensuse.org/request/show/706514
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=25
2019-05-30 13:21:00 +00:00
Dominique Leuenberger
95a422834c Accepting request 681715 from security:tls
- Update to 1.1.1b release

OBS-URL: https://build.opensuse.org/request/show/681715
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=145
2019-05-16 19:54:50 +00:00
Tomáš Chvátal
010eeaff31 Accepting request 680155 from home:pmonrealgonzalez:branches:security:tls
- Update to 1.1.1b release

OBS-URL: https://build.opensuse.org/request/show/680155
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=24
2019-02-28 15:36:08 +00:00
Tomáš Chvátal
f89f52bf78 Accepting request 650514 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1a release

OBS-URL: https://build.opensuse.org/request/show/650514
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=23
2018-11-20 14:58:06 +00:00
Vítězslav Čížek
ed50f7c230 Accepting request 635008 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1 release

OBS-URL: https://build.opensuse.org/request/show/635008
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=22
2018-09-11 15:12:30 +00:00
Vítězslav Čížek
4455ff4fb3 Accepting request 631305 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1~pre9 (Beta 7)

OBS-URL: https://build.opensuse.org/request/show/631305
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=21
2018-08-24 10:39:43 +00:00
Tomáš Chvátal
dcffbd897d Accepting request 629238 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.0i release

OBS-URL: https://build.opensuse.org/request/show/629238
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=20
2018-08-14 16:24:37 +00:00
Dominique Leuenberger
bd189bb34e Accepting request 591688 from security:tls
OBS-URL: https://build.opensuse.org/request/show/591688
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=144
2018-03-30 10:00:06 +00:00
Tomáš Chvátal
1ab3b9a360 Accepting request 591685 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.0h release

OBS-URL: https://build.opensuse.org/request/show/591685
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=19
2018-03-27 15:19:47 +00:00
Dominique Leuenberger
5ab1c4f0aa Accepting request 578326 from security:tls
OBS-URL: https://build.opensuse.org/request/show/578326
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=143
2018-03-01 11:04:40 +00:00
Vítězslav Čížek
357c68ceaa Accepting request 578317 from home:vitezslav_cizek:branches:security:tls
- update baselibs.conf

OBS-URL: https://build.opensuse.org/request/show/578317
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=18
2018-02-20 11:18:04 +00:00
Vítězslav Čížek
450bc8968e Accepting request 577235 from home:vitezslav_cizek:branches:security:tls
- change the sonum to 1.1, as all the minor versions keep ABI
  compatibility (bsc#1081335)

OBS-URL: https://build.opensuse.org/request/show/577235
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=17
2018-02-16 12:13:39 +00:00
Dominique Leuenberger
e03e941b38 Accepting request 541546 from security:tls
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/541546
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=142
2017-11-26 09:34:40 +00:00
Dominique Leuenberger
3b4f48bae5 Accepting request 538750 from security:tls
OBS-URL: https://build.opensuse.org/request/show/538750
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=141
2017-11-10 13:37:17 +00:00
Vítězslav Čížek
3e27fb1ef2 Accepting request 539342 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.0g release

OBS-URL: https://build.opensuse.org/request/show/539342
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=16
2017-11-06 15:49:22 +00:00
Tomáš Chvátal
3a7d8fec85 Accepting request 538520 from home:vitezslav_cizek:branches:security:tls
- Revert version back to 1.0.2m to get security fixes quickly to
  Tumbleweed
  * OpenSSL Security Advisory [02 Nov 2017] (bsc#1066242,bsc#1056058)

OBS-URL: https://build.opensuse.org/request/show/538520
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=15
2017-11-03 12:35:59 +00:00
Tomáš Chvátal
fdaa161c0b - Switch to 1.1.0f release as default again
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=14
2017-07-31 11:16:13 +00:00
Dominique Leuenberger
5725cb2f12 Accepting request 509431 from security:tls
1

OBS-URL: https://build.opensuse.org/request/show/509431
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=140
2017-07-17 07:01:38 +00:00
Tomáš Chvátal
b52242687e Accepting request 509430 from home:vitezslav_cizek:branches:security:tls
- Obsolete openssl-debuginfo
  * the package doesn't exist any more, has been replaced by
    openssl-{so_version}-debuginfo (bsc#1040172)

OBS-URL: https://build.opensuse.org/request/show/509430
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=13
2017-07-11 12:03:16 +00:00
Dominique Leuenberger
e3b20e69a2 Accepting request 506205 from security:tls
- Revert back to 1.0.2l for now so we get new fixes of 1.0 openssl
  to tumbleweed

- Update to 1.1.0f release

- Switch default to openssl-1.1.0

OBS-URL: https://build.opensuse.org/request/show/506205
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=139
2017-06-27 08:19:50 +00:00
Tomáš Chvátal
d6bd27301a - Revert back to 1.0.2l for now so we get new fixes of 1.0 openssl
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=12
2017-06-26 09:13:37 +00:00
Tomáš Chvátal
0083957a62 OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=11 2017-06-26 09:13:25 +00:00
Tomáš Chvátal
1329b4c8df - Revert back to 1.0.0l for now so we get new fixes of 1.0 openssl
to tumbleweed

OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=10
2017-06-23 15:24:24 +00:00
Tomáš Chvátal
2ce6cf08f7 - Update to 1.1.0f release
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=9
2017-05-29 10:17:01 +00:00
Tomáš Chvátal
1c3f141485 - Switch default to openssl-1.1.0
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=8
2017-05-24 08:06:09 +00:00
Dominique Leuenberger
9d1003ce7d Accepting request 492985 from security:tls
- Provide pkgconfig(openssl)

- Provide basic baselibs.conf for 32bit subpackages
- Specify this package as noarch (as we just provide README files)

- Fix typo in openssl requires
- Add dependency on the branched devel package
- Provide all pkgconfig symbols to hide them in versioned subpkgs
- This allows us to propagate only the preffered version of openssl
  while allowing us to add extra openssl only as additional dependency

- Remove the ssl provides as it is applicable for only those that
  really provide it

- Prepare to split to various subpackages converting main one to
  dummy package
- Reduce to only provide main pkg and devel and depend on proper
  soversioned package
- Version in this package needs to be synced with the one provided
  by the split package
- Remove all the patches, now in the proper versioned namespace:
  * merge_from_0.9.8k.patch
  * openssl-1.0.0-c_rehash-compat.diff
  * bug610223.patch
  * openssl-ocloexec.patch
  * openssl-1.0.2a-padlock64.patch
  * openssl-fix-pod-syntax.diff
  * openssl-truststore.patch
  * compression_methods_switch.patch
  * 0005-libssl-Hide-library-private-symbols.patch

OBS-URL: https://build.opensuse.org/request/show/492985
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=138
2017-05-18 18:46:33 +00:00
Yuchen Lin
491c541700 Accepting request 485219 from Base:System
- Remove O3 from optflags, no need to not rely on distro wide settings
- Remove conditions for sle10 and sle11, we care only about sle12+
- USE SUSE instead of SuSE in readme
- Pass over with spec-cleaner (forwarded request 485192 from scarabeus_iv)

OBS-URL: https://build.opensuse.org/request/show/485219
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=137
2017-04-11 07:29:32 +00:00
Dominique Leuenberger
de4d1be4ab Accepting request 454260 from Base:System
- fix X509_CERT_FILE path (bsc#1022271) and rename
  updated openssl-1.0.1e-truststore.diff to openssl-truststore.patch (forwarded request 454258 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/454260
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=136
2017-02-07 10:57:29 +00:00
Dominique Leuenberger
f7574150c5 Accepting request 452919 from Base:System
- Updated to openssl 1.0.2k
  - bsc#1009528 / CVE-2016-7055: openssl: Montgomery multiplication may produce incorrect results
  - bsc#1019334 / CVE-2016-7056: openssl: ECSDA P-256 timing attack key recovery
  - bsc#1022085 / CVE-2017-3731: openssl: Truncated packet could crash via OOB read
  - bsc#1022086 / CVE-2017-3732: openssl: BN_mod_exp may produce incorrect results on x86_64

OBS-URL: https://build.opensuse.org/request/show/452919
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=135
2017-01-31 11:37:40 +00:00
Dominique Leuenberger
021091d55f Accepting request 433063 from Base:System
- resume reading from /dev/urandom when interrupted by a signal
  (bsc#995075)
  * add openssl-randfile_fread_interrupt.patch

- add FIPS changes from SP2:
- fix problems with locking in FIPS mode (bsc#992120)
  * duplicates: bsc#991877, bsc#991193, bsc#990392, bsc#990428
    and bsc#990207
  * bring back openssl-fipslocking.patch
- drop openssl-fips_RSA_compute_d_with_lcm.patch (upstream)
  (bsc#984323)
- don't check for /etc/system-fips (bsc#982268)
  * add openssl-fips-dont_run_FIPS_module_installed.patch
- refresh openssl-fips-rsagen-d-bits.patch (forwarded request 431508 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/433063
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=134
2016-10-10 14:17:30 +00:00
Dominique Leuenberger
6a01eea162 Accepting request 430498 from Base:System
- update to openssl-1.0.2j
  * Missing CRL sanity check (CVE-2016-7052 bsc#1001148)

- OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)
  Severity: High
  * OCSP Status Request extension unbounded memory growth
    (CVE-2016-6304) (bsc#999666)
  Severity: Low
  * Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575)
  * Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
  * DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
  * OOB read in TS_OBJ_print_bio() (CVE-2016-2180) (bsc#990419)
  * DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
  * OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
  * Birthday attack against 64-bit block ciphers (SWEET32)
    (CVE-2016-2183) (bsc#995359)
  * Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
  * OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
  * Certificate message OOB reads (CVE-2016-6306) (bsc#999668)
- update to openssl-1.0.2i
  * remove patches:
    openssl-1.0.2a-new-fips-reqs.patch
    openssl-1.0.2e-fips.patch
  * add patches:
    openssl-1.0.2i-fips.patch
    openssl-1.0.2i-new-fips-reqs.patch

- fix crash in print_notice (bsc#998190)
  * add openssl-print_notice-NULL_crash.patch

OBS-URL: https://build.opensuse.org/request/show/430498
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=133
2016-09-28 13:03:33 +00:00
Dominique Leuenberger
fa61203f41 Accepting request 393456 from Base:System
- OpenSSL Security Advisory [3rd May 2016]
- update to 1.0.2h (boo#977584, boo#977663)
  * Prevent padding oracle in AES-NI CBC MAC check
     A MITM attacker can use a padding oracle attack to decrypt traffic
     when the connection uses an AES CBC cipher and the server support
     AES-NI.
     (CVE-2016-2107, boo#977616)
  * Fix EVP_EncodeUpdate overflow
     An overflow can occur in the EVP_EncodeUpdate() function which is used for
     Base64 encoding of binary data. If an attacker is able to supply very large
     amounts of input data then a length check can overflow resulting in a heap
     corruption.
     (CVE-2016-2105, boo#977614)
  * Fix EVP_EncryptUpdate overflow
     An overflow can occur in the EVP_EncryptUpdate() function. If an attacker
     is able to supply very large amounts of input data after a previous call to
     EVP_EncryptUpdate() with a partial block then a length check can overflow
     resulting in a heap corruption.
     (CVE-2016-2106, boo#977615)
  * Prevent ASN.1 BIO excessive memory allocation
     When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio()
     a short invalid encoding can casuse allocation of large amounts of memory
     potentially consuming excessive resources or exhausting memory.
     (CVE-2016-2109, boo#976942)
  * EBCDIC overread
     ASN1 Strings that are over 1024 bytes can cause an overread in applications
     using the X509_NAME_oneline() function on EBCDIC systems. This could result
     in arbitrary stack data being returned in the buffer.
     (CVE-2016-2176, boo#978224)
  * Modify behavior of ALPN to invoke callback after SNI/servername (forwarded request 393446 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/393456
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=132
2016-05-08 08:38:49 +00:00
Dominique Leuenberger
fa96b8cfdd Accepting request 390473 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/390473
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=131
2016-04-22 14:17:16 +00:00
Dominique Leuenberger
2ebd052507 Accepting request 363602 from Base:System
- update to 1.0.2g (bsc#968044)
  * Disable weak ciphers in SSLv3 and up in default builds of OpenSSL.
    Builds that are not configured with "enable-weak-ssl-ciphers" will not
    provide any "EXPORT" or "LOW" strength ciphers.
  * Disable SSLv2 default build, default negotiation and weak ciphers.  SSLv2
    is by default disabled at build-time.  Builds that are not configured with
    "enable-ssl2" will not support SSLv2.  Even if "enable-ssl2" is used,
    users who want to negotiate SSLv2 via the version-flexible SSLv23_method()
    will need to explicitly call either of:
        SSL_CTX_clear_options(ctx, SSL_OP_NO_SSLv2);
    or
        SSL_clear_options(ssl, SSL_OP_NO_SSLv2);
    (CVE-2016-0800)
  * Fix a double-free in DSA code
     (CVE-2016-0705)
  * Disable SRP fake user seed to address a server memory leak.
     Add a new method SRP_VBASE_get1_by_user that handles the seed properly.
     (CVE-2016-0798)
  * Fix BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption
     (CVE-2016-0797)
  *) Side channel attack on modular exponentiation
     http://cachebleed.info.
     (CVE-2016-0702)
  *) Change the req app to generate a 2048-bit RSA/DSA key by default,
     if no keysize is specified with default_bits. This fixes an
     omission in an earlier change that changed all RSA/DSA key generation
     apps to use 2048 bits by default. (forwarded request 363599 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/363602
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=130
2016-03-05 10:21:18 +00:00
Stephan Kulow
ed81eb44e1 Accepting request 347504 from Base:System
- update to 1.0.2e
  * fixes five security vulnerabilities
  * Anon DH ServerKeyExchange with 0 p parameter
    (CVE-2015-1794) (bsc#957984)
  * BN_mod_exp may produce incorrect results on x86_64
    (CVE-2015-3193) (bsc#957814)
  * Certificate verify crash with missing PSS parameter
    (CVE-2015-3194) (bsc#957815)
  * X509_ATTRIBUTE memory leak
    (CVE-2015-3195) (bsc#957812)
  * Race condition handling PSK identify hint
    (CVE-2015-3196) (bsc#957813)
- pulled a refreshed fips patch from Fedora
  * openssl-1.0.2a-fips.patch was replaced by
    openssl-1.0.2e-fips.patch
- refresh openssl-ocloexec.patch

OBS-URL: https://build.opensuse.org/request/show/347504
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=129
2015-12-13 08:36:18 +00:00
Stephan Kulow
7f772876ff Accepting request 315685 from Base:System
- update to 1.0.2d
  * fixes CVE-2015-1793 (bsc#936746)
  Alternate chains certificate forgery
     During certificate verfification, OpenSSL will attempt to find an
     alternative certificate chain if the first attempt to build such a chain
     fails. An error in the implementation of this logic can mean that an
     attacker could cause certain checks on untrusted certificates to be
     bypassed, such as the CA flag, enabling them to use a valid leaf
     certificate to act as a CA and "issue" an invalid certificate.
- drop openssl-fix_invalid_manpage_name.patch (upstream) (forwarded request 315682 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/315685
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=128
2015-07-12 20:51:54 +00:00
Dominique Leuenberger
bdf3209e96 Accepting request 310849 from Base:System
- update to 1.0.2a
  * Major changes since 1.0.1:
    - Suite B support for TLS 1.2 and DTLS 1.2
    - Support for DTLS 1.2
    - TLS automatic EC curve selection.
    - API to set TLS supported signature algorithms and curves
    - SSL_CONF configuration API.
    - TLS Brainpool support.
    - ALPN support.
    - CMS support for RSA-PSS, RSA-OAEP, ECDH and X9.42 DH.
- packaging changes:
  * merged patches modifying CIPHER_LIST into one, dropping:
    - openssl-1.0.1e-add-suse-default-cipher-header.patch
    - openssl-libssl-noweakciphers.patch
  * fix a manpage with invalid name
    - added openssl-fix_invalid_manpage_name.patch
  * remove a missing fips function
    - openssl-missing_FIPS_ec_group_new_by_curve_name.patch
  * reimported patches from Fedora
    dropped patches:
    - openssl-1.0.1c-default-paths.patch
    - openssl-1.0.1c-ipv6-apps.patch
    - openssl-1.0.1e-fips-ctor.patch
    - openssl-1.0.1e-fips-ec.patch
    - openssl-1.0.1e-fips.patch
    - openssl-1.0.1e-new-fips-reqs.patch
    - VIA_padlock_support_on_64systems.patch
    added patches:
    - openssl-1.0.2a-default-paths.patch
    - openssl-1.0.2a-fips-ctor.patch (forwarded request 309611 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/310849
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=127
2015-06-08 06:25:56 +00:00
Dominique Leuenberger
42aa3a9eb7 Accepting request 291607 from Base:System
- security update:
 * CVE-2015-0209 (bnc#919648)
   - Fix a failure to NULL a pointer freed on error
 * CVE-2015-0286 (bnc#922496)
   - Segmentation fault in ASN1_TYPE_cmp
 * CVE-2015-0287 (bnc#922499)
   - ASN.1 structure reuse memory corruption
 * CVE-2015-0288 x509: (bnc#920236)
   - added missing public key is not NULL check
 * CVE-2015-0289 (bnc#922500)
   - PKCS7 NULL pointer dereferences
 * CVE-2015-0293 (bnc#922488)
   - Fix reachable assert in SSLv2 servers
 * added patches:
   openssl-CVE-2015-0209.patch
   openssl-CVE-2015-0286.patch
   openssl-CVE-2015-0287.patch
   openssl-CVE-2015-0288.patch
   openssl-CVE-2015-0289.patch
   openssl-CVE-2015-0293.patch (forwarded request 291606 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/291607
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=126
2015-03-23 11:16:06 +00:00
Dominique Leuenberger
840c62159b Accepting request 284003 from Base:System
- The DATE stamp moved from crypto/Makefile to crypto/buildinf.h,
  replace it there (bsc#915947)

OBS-URL: https://build.opensuse.org/request/show/284003
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=125
2015-02-06 09:50:56 +00:00
Dominique Leuenberger
9f18cdd3d8 Accepting request 280570 from Base:System
- openssl 1.0.1k release
  bsc#912294 CVE-2014-3571: Fix DTLS segmentation fault in dtls1_get_record.
  bsc#912292 CVE-2015-0206: Fix DTLS memory leak in dtls1_buffer_record.
  bsc#911399 CVE-2014-3569: Fix issue where no-ssl3 configuration sets method to NULL.
  bsc#912015 CVE-2014-3572: Abort handshake if server key exchange
                            message is omitted for ephemeral ECDH ciphersuites.
  bsc#912014 CVE-2015-0204: Remove non-export ephemeral RSA code on client and server.
  bsc#912293 CVE-2015-0205: Fixed issue where DH client certificates are accepted without verification.
  bsc#912018 CVE-2014-8275: Fix various certificate fingerprint issues.
  bsc#912296 CVE-2014-3570: Correct Bignum squaring.
  and other bugfixes.
- openssl.keyring: use Matt Caswells current key. 
  pub  2048R/0E604491 2013-04-30
  uid                            Matt Caswell <frodo@baggins.org>
  uid                            Matt Caswell <matt@openssl.org>
  sub  2048R/E3C21B70 2013-04-30
- openssl-1.0.1e-fips.patch: rediffed
- openssl-1.0.1i-noec2m-fix.patch: removed (upstream)
- openssl-ocloexec.patch: rediffed

OBS-URL: https://build.opensuse.org/request/show/280570
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=124
2015-01-20 20:53:46 +00:00
Dominique Leuenberger
984610bf7f Accepting request 264696 from Base:System
I also submitted libcamgm that matches this submit


- suse_version 10.1 & 10.2 x86_64 can not enable-ec_nistp_64_gcc_128

- openssl-1.0.1i-noec2m-fix.patch: only report the Elliptic Curves
  we actually support (not the binary ones) (bnc#905037)

- openSUSE < 11.2 doesn't have accept4()

- openSSL 1.0.1j 
* Fix SRTP Memory Leak (CVE-2014-3513)
* Session Ticket Memory Leak (CVE-2014-3567)
* Add SSL 3.0 Fallback protection (TLS_FALLBACK_SCSV)
* Build option no-ssl3 is incomplete (CVE-2014-3568)

OBS-URL: https://build.opensuse.org/request/show/264696
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=123
2014-12-17 18:18:04 +00:00
Stephan Kulow
0985bc43b2 Accepting request 245642 from Base:System
- openssl.keyring: the 1.0.1i release was done by 
  Matt Caswell <matt@openssl.org> UK 0E604491

- rename README.SuSE (old spelling) to README.SUSE (bnc#889013)

- update to 1.0.1i
  * Fix SRP buffer overrun vulnerability. Invalid parameters passed to the
    SRP code can be overrun an internal buffer. Add sanity check that
    g, A, B < N to SRP code.
    (CVE-2014-3512)
  * A flaw in the OpenSSL SSL/TLS server code causes the server to negotiate
    TLS 1.0 instead of higher protocol versions when the ClientHello message
    is badly fragmented. This allows a man-in-the-middle attacker to force a
    downgrade to TLS 1.0 even if both the server and the client support a
    higher protocol version, by modifying the client's TLS records.
    (CVE-2014-3511)
  * OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject
    to a denial of service attack. A malicious server can crash the client
    with a null pointer dereference (read) by specifying an anonymous (EC)DH
    ciphersuite and sending carefully crafted handshake messages.
    (CVE-2014-3510)
  * By sending carefully crafted DTLS packets an attacker could cause openssl
    to leak memory. This can be exploited through a Denial of Service attack.
    (CVE-2014-3507)
  * An attacker can force openssl to consume large amounts of memory whilst
    processing DTLS handshake messages. This can be exploited through a
    Denial of Service attack.
    (CVE-2014-3506)
  * An attacker can force an error condition which causes openssl to crash
    whilst processing DTLS packets due to memory being freed twice. This

OBS-URL: https://build.opensuse.org/request/show/245642
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=121
2014-08-25 09:03:07 +00:00
Stephan Kulow
0dd078bb95 Accepting request 241763 from Base:System
- Move manpages around such that .3 is in openssl-doc
  and .1 in openssl (forwarded request 241758 from jengelh)

OBS-URL: https://build.opensuse.org/request/show/241763
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=120
2014-07-27 06:25:44 +00:00
Stephan Kulow
a57bd6b997 Accepting request 238467 from Base:System
- recommend: ca-certificates-mozilla instead of openssl-certs

OBS-URL: https://build.opensuse.org/request/show/238467
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=119
2014-06-25 13:24:16 +00:00