Commit Graph

154 Commits

Author SHA256 Message Date
afb8eed7f6 Accepting request 873680 from home:pmonrealgonzalez:branches:security:tls
- Update to 1.1.1j release

OBS-URL: https://build.opensuse.org/request/show/873680
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=33
2021-02-22 12:20:11 +00:00
de3e0f894d Accepting request 854069 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1i release

OBS-URL: https://build.opensuse.org/request/show/854069
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=32
2020-12-14 11:22:10 +00:00
ced74d8631 Accepting request 836173 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1h release

OBS-URL: https://build.opensuse.org/request/show/836173
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=31
2020-09-23 06:41:04 +00:00
Martin Pluskal
76a7de0b98 Accepting request 796076 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1g release

OBS-URL: https://build.opensuse.org/request/show/796076
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=30
2020-04-21 15:13:11 +00:00
90ef91ed19 Accepting request 790181 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1f release

OBS-URL: https://build.opensuse.org/request/show/790181
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=29
2020-03-31 14:27:25 +00:00
Vítězslav Čížek
9956f6eae8 Accepting request 787238 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1e release

OBS-URL: https://build.opensuse.org/request/show/787238
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=28
2020-03-22 11:19:18 +00:00
Tomáš Chvátal
5605777932 Accepting request 753234 from home:dimstar:Factory
Fix build in Staging:N with RPM 4.15

OBS-URL: https://build.opensuse.org/request/show/753234
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=27
2019-12-03 13:04:43 +00:00
101b1f684e Accepting request 730186 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1d release

OBS-URL: https://build.opensuse.org/request/show/730186
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=26
2019-09-11 15:32:19 +00:00
Tomáš Chvátal
a4b427864c Accepting request 706514 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1c release

OBS-URL: https://build.opensuse.org/request/show/706514
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=25
2019-05-30 13:21:00 +00:00
Tomáš Chvátal
010eeaff31 Accepting request 680155 from home:pmonrealgonzalez:branches:security:tls
- Update to 1.1.1b release

OBS-URL: https://build.opensuse.org/request/show/680155
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=24
2019-02-28 15:36:08 +00:00
Tomáš Chvátal
f89f52bf78 Accepting request 650514 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1a release

OBS-URL: https://build.opensuse.org/request/show/650514
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=23
2018-11-20 14:58:06 +00:00
Vítězslav Čížek
ed50f7c230 Accepting request 635008 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1 release

OBS-URL: https://build.opensuse.org/request/show/635008
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=22
2018-09-11 15:12:30 +00:00
Vítězslav Čížek
4455ff4fb3 Accepting request 631305 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1~pre9 (Beta 7)

OBS-URL: https://build.opensuse.org/request/show/631305
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=21
2018-08-24 10:39:43 +00:00
Tomáš Chvátal
dcffbd897d Accepting request 629238 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.0i release

OBS-URL: https://build.opensuse.org/request/show/629238
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=20
2018-08-14 16:24:37 +00:00
Tomáš Chvátal
1ab3b9a360 Accepting request 591685 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.0h release

OBS-URL: https://build.opensuse.org/request/show/591685
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=19
2018-03-27 15:19:47 +00:00
Vítězslav Čížek
357c68ceaa Accepting request 578317 from home:vitezslav_cizek:branches:security:tls
- update baselibs.conf

OBS-URL: https://build.opensuse.org/request/show/578317
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=18
2018-02-20 11:18:04 +00:00
Vítězslav Čížek
450bc8968e Accepting request 577235 from home:vitezslav_cizek:branches:security:tls
- change the sonum to 1.1, as all the minor versions keep ABI
  compatibility (bsc#1081335)

OBS-URL: https://build.opensuse.org/request/show/577235
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=17
2018-02-16 12:13:39 +00:00
Vítězslav Čížek
3e27fb1ef2 Accepting request 539342 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.0g release

OBS-URL: https://build.opensuse.org/request/show/539342
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=16
2017-11-06 15:49:22 +00:00
Tomáš Chvátal
3a7d8fec85 Accepting request 538520 from home:vitezslav_cizek:branches:security:tls
- Revert version back to 1.0.2m to get security fixes quickly to
  Tumbleweed
  * OpenSSL Security Advisory [02 Nov 2017] (bsc#1066242,bsc#1056058)

OBS-URL: https://build.opensuse.org/request/show/538520
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=15
2017-11-03 12:35:59 +00:00
Tomáš Chvátal
fdaa161c0b - Switch to 1.1.0f release as default again
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=14
2017-07-31 11:16:13 +00:00
Tomáš Chvátal
b52242687e Accepting request 509430 from home:vitezslav_cizek:branches:security:tls
- Obsolete openssl-debuginfo
  * the package doesn't exist any more, has been replaced by
    openssl-{so_version}-debuginfo (bsc#1040172)

OBS-URL: https://build.opensuse.org/request/show/509430
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=13
2017-07-11 12:03:16 +00:00
Tomáš Chvátal
d6bd27301a - Revert back to 1.0.2l for now so we get new fixes of 1.0 openssl
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=12
2017-06-26 09:13:37 +00:00
Tomáš Chvátal
0083957a62 OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=11 2017-06-26 09:13:25 +00:00
Tomáš Chvátal
1329b4c8df - Revert back to 1.0.0l for now so we get new fixes of 1.0 openssl
to tumbleweed

OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=10
2017-06-23 15:24:24 +00:00
Tomáš Chvátal
2ce6cf08f7 - Update to 1.1.0f release
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=9
2017-05-29 10:17:01 +00:00
Tomáš Chvátal
1c3f141485 - Switch default to openssl-1.1.0
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl?expand=0&rev=8
2017-05-24 08:06:09 +00:00
Dominique Leuenberger
9d1003ce7d Accepting request 492985 from security:tls
- Provide pkgconfig(openssl)

- Provide basic baselibs.conf for 32bit subpackages
- Specify this package as noarch (as we just provide README files)

- Fix typo in openssl requires
- Add dependency on the branched devel package
- Provide all pkgconfig symbols to hide them in versioned subpkgs
- This allows us to propagate only the preffered version of openssl
  while allowing us to add extra openssl only as additional dependency

- Remove the ssl provides as it is applicable for only those that
  really provide it

- Prepare to split to various subpackages converting main one to
  dummy package
- Reduce to only provide main pkg and devel and depend on proper
  soversioned package
- Version in this package needs to be synced with the one provided
  by the split package
- Remove all the patches, now in the proper versioned namespace:
  * merge_from_0.9.8k.patch
  * openssl-1.0.0-c_rehash-compat.diff
  * bug610223.patch
  * openssl-ocloexec.patch
  * openssl-1.0.2a-padlock64.patch
  * openssl-fix-pod-syntax.diff
  * openssl-truststore.patch
  * compression_methods_switch.patch
  * 0005-libssl-Hide-library-private-symbols.patch

OBS-URL: https://build.opensuse.org/request/show/492985
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=138
2017-05-18 18:46:33 +00:00
Yuchen Lin
491c541700 Accepting request 485219 from Base:System
- Remove O3 from optflags, no need to not rely on distro wide settings
- Remove conditions for sle10 and sle11, we care only about sle12+
- USE SUSE instead of SuSE in readme
- Pass over with spec-cleaner (forwarded request 485192 from scarabeus_iv)

OBS-URL: https://build.opensuse.org/request/show/485219
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=137
2017-04-11 07:29:32 +00:00
Dominique Leuenberger
de4d1be4ab Accepting request 454260 from Base:System
- fix X509_CERT_FILE path (bsc#1022271) and rename
  updated openssl-1.0.1e-truststore.diff to openssl-truststore.patch (forwarded request 454258 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/454260
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=136
2017-02-07 10:57:29 +00:00
Dominique Leuenberger
f7574150c5 Accepting request 452919 from Base:System
- Updated to openssl 1.0.2k
  - bsc#1009528 / CVE-2016-7055: openssl: Montgomery multiplication may produce incorrect results
  - bsc#1019334 / CVE-2016-7056: openssl: ECSDA P-256 timing attack key recovery
  - bsc#1022085 / CVE-2017-3731: openssl: Truncated packet could crash via OOB read
  - bsc#1022086 / CVE-2017-3732: openssl: BN_mod_exp may produce incorrect results on x86_64

OBS-URL: https://build.opensuse.org/request/show/452919
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=135
2017-01-31 11:37:40 +00:00
Dominique Leuenberger
021091d55f Accepting request 433063 from Base:System
- resume reading from /dev/urandom when interrupted by a signal
  (bsc#995075)
  * add openssl-randfile_fread_interrupt.patch

- add FIPS changes from SP2:
- fix problems with locking in FIPS mode (bsc#992120)
  * duplicates: bsc#991877, bsc#991193, bsc#990392, bsc#990428
    and bsc#990207
  * bring back openssl-fipslocking.patch
- drop openssl-fips_RSA_compute_d_with_lcm.patch (upstream)
  (bsc#984323)
- don't check for /etc/system-fips (bsc#982268)
  * add openssl-fips-dont_run_FIPS_module_installed.patch
- refresh openssl-fips-rsagen-d-bits.patch (forwarded request 431508 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/433063
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=134
2016-10-10 14:17:30 +00:00
Dominique Leuenberger
6a01eea162 Accepting request 430498 from Base:System
- update to openssl-1.0.2j
  * Missing CRL sanity check (CVE-2016-7052 bsc#1001148)

- OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)
  Severity: High
  * OCSP Status Request extension unbounded memory growth
    (CVE-2016-6304) (bsc#999666)
  Severity: Low
  * Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575)
  * Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
  * DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
  * OOB read in TS_OBJ_print_bio() (CVE-2016-2180) (bsc#990419)
  * DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
  * OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
  * Birthday attack against 64-bit block ciphers (SWEET32)
    (CVE-2016-2183) (bsc#995359)
  * Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
  * OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
  * Certificate message OOB reads (CVE-2016-6306) (bsc#999668)
- update to openssl-1.0.2i
  * remove patches:
    openssl-1.0.2a-new-fips-reqs.patch
    openssl-1.0.2e-fips.patch
  * add patches:
    openssl-1.0.2i-fips.patch
    openssl-1.0.2i-new-fips-reqs.patch

- fix crash in print_notice (bsc#998190)
  * add openssl-print_notice-NULL_crash.patch

OBS-URL: https://build.opensuse.org/request/show/430498
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=133
2016-09-28 13:03:33 +00:00
Dominique Leuenberger
fa61203f41 Accepting request 393456 from Base:System
- OpenSSL Security Advisory [3rd May 2016]
- update to 1.0.2h (boo#977584, boo#977663)
  * Prevent padding oracle in AES-NI CBC MAC check
     A MITM attacker can use a padding oracle attack to decrypt traffic
     when the connection uses an AES CBC cipher and the server support
     AES-NI.
     (CVE-2016-2107, boo#977616)
  * Fix EVP_EncodeUpdate overflow
     An overflow can occur in the EVP_EncodeUpdate() function which is used for
     Base64 encoding of binary data. If an attacker is able to supply very large
     amounts of input data then a length check can overflow resulting in a heap
     corruption.
     (CVE-2016-2105, boo#977614)
  * Fix EVP_EncryptUpdate overflow
     An overflow can occur in the EVP_EncryptUpdate() function. If an attacker
     is able to supply very large amounts of input data after a previous call to
     EVP_EncryptUpdate() with a partial block then a length check can overflow
     resulting in a heap corruption.
     (CVE-2016-2106, boo#977615)
  * Prevent ASN.1 BIO excessive memory allocation
     When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio()
     a short invalid encoding can casuse allocation of large amounts of memory
     potentially consuming excessive resources or exhausting memory.
     (CVE-2016-2109, boo#976942)
  * EBCDIC overread
     ASN1 Strings that are over 1024 bytes can cause an overread in applications
     using the X509_NAME_oneline() function on EBCDIC systems. This could result
     in arbitrary stack data being returned in the buffer.
     (CVE-2016-2176, boo#978224)
  * Modify behavior of ALPN to invoke callback after SNI/servername (forwarded request 393446 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/393456
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=132
2016-05-08 08:38:49 +00:00
Dominique Leuenberger
fa96b8cfdd Accepting request 390473 from Base:System
1

OBS-URL: https://build.opensuse.org/request/show/390473
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=131
2016-04-22 14:17:16 +00:00
Dominique Leuenberger
2ebd052507 Accepting request 363602 from Base:System
- update to 1.0.2g (bsc#968044)
  * Disable weak ciphers in SSLv3 and up in default builds of OpenSSL.
    Builds that are not configured with "enable-weak-ssl-ciphers" will not
    provide any "EXPORT" or "LOW" strength ciphers.
  * Disable SSLv2 default build, default negotiation and weak ciphers.  SSLv2
    is by default disabled at build-time.  Builds that are not configured with
    "enable-ssl2" will not support SSLv2.  Even if "enable-ssl2" is used,
    users who want to negotiate SSLv2 via the version-flexible SSLv23_method()
    will need to explicitly call either of:
        SSL_CTX_clear_options(ctx, SSL_OP_NO_SSLv2);
    or
        SSL_clear_options(ssl, SSL_OP_NO_SSLv2);
    (CVE-2016-0800)
  * Fix a double-free in DSA code
     (CVE-2016-0705)
  * Disable SRP fake user seed to address a server memory leak.
     Add a new method SRP_VBASE_get1_by_user that handles the seed properly.
     (CVE-2016-0798)
  * Fix BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption
     (CVE-2016-0797)
  *) Side channel attack on modular exponentiation
     http://cachebleed.info.
     (CVE-2016-0702)
  *) Change the req app to generate a 2048-bit RSA/DSA key by default,
     if no keysize is specified with default_bits. This fixes an
     omission in an earlier change that changed all RSA/DSA key generation
     apps to use 2048 bits by default. (forwarded request 363599 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/363602
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=130
2016-03-05 10:21:18 +00:00
Stephan Kulow
ed81eb44e1 Accepting request 347504 from Base:System
- update to 1.0.2e
  * fixes five security vulnerabilities
  * Anon DH ServerKeyExchange with 0 p parameter
    (CVE-2015-1794) (bsc#957984)
  * BN_mod_exp may produce incorrect results on x86_64
    (CVE-2015-3193) (bsc#957814)
  * Certificate verify crash with missing PSS parameter
    (CVE-2015-3194) (bsc#957815)
  * X509_ATTRIBUTE memory leak
    (CVE-2015-3195) (bsc#957812)
  * Race condition handling PSK identify hint
    (CVE-2015-3196) (bsc#957813)
- pulled a refreshed fips patch from Fedora
  * openssl-1.0.2a-fips.patch was replaced by
    openssl-1.0.2e-fips.patch
- refresh openssl-ocloexec.patch

OBS-URL: https://build.opensuse.org/request/show/347504
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=129
2015-12-13 08:36:18 +00:00
Stephan Kulow
7f772876ff Accepting request 315685 from Base:System
- update to 1.0.2d
  * fixes CVE-2015-1793 (bsc#936746)
  Alternate chains certificate forgery
     During certificate verfification, OpenSSL will attempt to find an
     alternative certificate chain if the first attempt to build such a chain
     fails. An error in the implementation of this logic can mean that an
     attacker could cause certain checks on untrusted certificates to be
     bypassed, such as the CA flag, enabling them to use a valid leaf
     certificate to act as a CA and "issue" an invalid certificate.
- drop openssl-fix_invalid_manpage_name.patch (upstream) (forwarded request 315682 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/315685
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=128
2015-07-12 20:51:54 +00:00
Dominique Leuenberger
bdf3209e96 Accepting request 310849 from Base:System
- update to 1.0.2a
  * Major changes since 1.0.1:
    - Suite B support for TLS 1.2 and DTLS 1.2
    - Support for DTLS 1.2
    - TLS automatic EC curve selection.
    - API to set TLS supported signature algorithms and curves
    - SSL_CONF configuration API.
    - TLS Brainpool support.
    - ALPN support.
    - CMS support for RSA-PSS, RSA-OAEP, ECDH and X9.42 DH.
- packaging changes:
  * merged patches modifying CIPHER_LIST into one, dropping:
    - openssl-1.0.1e-add-suse-default-cipher-header.patch
    - openssl-libssl-noweakciphers.patch
  * fix a manpage with invalid name
    - added openssl-fix_invalid_manpage_name.patch
  * remove a missing fips function
    - openssl-missing_FIPS_ec_group_new_by_curve_name.patch
  * reimported patches from Fedora
    dropped patches:
    - openssl-1.0.1c-default-paths.patch
    - openssl-1.0.1c-ipv6-apps.patch
    - openssl-1.0.1e-fips-ctor.patch
    - openssl-1.0.1e-fips-ec.patch
    - openssl-1.0.1e-fips.patch
    - openssl-1.0.1e-new-fips-reqs.patch
    - VIA_padlock_support_on_64systems.patch
    added patches:
    - openssl-1.0.2a-default-paths.patch
    - openssl-1.0.2a-fips-ctor.patch (forwarded request 309611 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/310849
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=127
2015-06-08 06:25:56 +00:00
Dominique Leuenberger
42aa3a9eb7 Accepting request 291607 from Base:System
- security update:
 * CVE-2015-0209 (bnc#919648)
   - Fix a failure to NULL a pointer freed on error
 * CVE-2015-0286 (bnc#922496)
   - Segmentation fault in ASN1_TYPE_cmp
 * CVE-2015-0287 (bnc#922499)
   - ASN.1 structure reuse memory corruption
 * CVE-2015-0288 x509: (bnc#920236)
   - added missing public key is not NULL check
 * CVE-2015-0289 (bnc#922500)
   - PKCS7 NULL pointer dereferences
 * CVE-2015-0293 (bnc#922488)
   - Fix reachable assert in SSLv2 servers
 * added patches:
   openssl-CVE-2015-0209.patch
   openssl-CVE-2015-0286.patch
   openssl-CVE-2015-0287.patch
   openssl-CVE-2015-0288.patch
   openssl-CVE-2015-0289.patch
   openssl-CVE-2015-0293.patch (forwarded request 291606 from vitezslav_cizek)

OBS-URL: https://build.opensuse.org/request/show/291607
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=126
2015-03-23 11:16:06 +00:00
Dominique Leuenberger
840c62159b Accepting request 284003 from Base:System
- The DATE stamp moved from crypto/Makefile to crypto/buildinf.h,
  replace it there (bsc#915947)

OBS-URL: https://build.opensuse.org/request/show/284003
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=125
2015-02-06 09:50:56 +00:00
Dominique Leuenberger
9f18cdd3d8 Accepting request 280570 from Base:System
- openssl 1.0.1k release
  bsc#912294 CVE-2014-3571: Fix DTLS segmentation fault in dtls1_get_record.
  bsc#912292 CVE-2015-0206: Fix DTLS memory leak in dtls1_buffer_record.
  bsc#911399 CVE-2014-3569: Fix issue where no-ssl3 configuration sets method to NULL.
  bsc#912015 CVE-2014-3572: Abort handshake if server key exchange
                            message is omitted for ephemeral ECDH ciphersuites.
  bsc#912014 CVE-2015-0204: Remove non-export ephemeral RSA code on client and server.
  bsc#912293 CVE-2015-0205: Fixed issue where DH client certificates are accepted without verification.
  bsc#912018 CVE-2014-8275: Fix various certificate fingerprint issues.
  bsc#912296 CVE-2014-3570: Correct Bignum squaring.
  and other bugfixes.
- openssl.keyring: use Matt Caswells current key. 
  pub  2048R/0E604491 2013-04-30
  uid                            Matt Caswell <frodo@baggins.org>
  uid                            Matt Caswell <matt@openssl.org>
  sub  2048R/E3C21B70 2013-04-30
- openssl-1.0.1e-fips.patch: rediffed
- openssl-1.0.1i-noec2m-fix.patch: removed (upstream)
- openssl-ocloexec.patch: rediffed

OBS-URL: https://build.opensuse.org/request/show/280570
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=124
2015-01-20 20:53:46 +00:00
Dominique Leuenberger
984610bf7f Accepting request 264696 from Base:System
I also submitted libcamgm that matches this submit


- suse_version 10.1 & 10.2 x86_64 can not enable-ec_nistp_64_gcc_128

- openssl-1.0.1i-noec2m-fix.patch: only report the Elliptic Curves
  we actually support (not the binary ones) (bnc#905037)

- openSUSE < 11.2 doesn't have accept4()

- openSSL 1.0.1j 
* Fix SRTP Memory Leak (CVE-2014-3513)
* Session Ticket Memory Leak (CVE-2014-3567)
* Add SSL 3.0 Fallback protection (TLS_FALLBACK_SCSV)
* Build option no-ssl3 is incomplete (CVE-2014-3568)

OBS-URL: https://build.opensuse.org/request/show/264696
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=123
2014-12-17 18:18:04 +00:00
Stephan Kulow
0985bc43b2 Accepting request 245642 from Base:System
- openssl.keyring: the 1.0.1i release was done by 
  Matt Caswell <matt@openssl.org> UK 0E604491

- rename README.SuSE (old spelling) to README.SUSE (bnc#889013)

- update to 1.0.1i
  * Fix SRP buffer overrun vulnerability. Invalid parameters passed to the
    SRP code can be overrun an internal buffer. Add sanity check that
    g, A, B < N to SRP code.
    (CVE-2014-3512)
  * A flaw in the OpenSSL SSL/TLS server code causes the server to negotiate
    TLS 1.0 instead of higher protocol versions when the ClientHello message
    is badly fragmented. This allows a man-in-the-middle attacker to force a
    downgrade to TLS 1.0 even if both the server and the client support a
    higher protocol version, by modifying the client's TLS records.
    (CVE-2014-3511)
  * OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject
    to a denial of service attack. A malicious server can crash the client
    with a null pointer dereference (read) by specifying an anonymous (EC)DH
    ciphersuite and sending carefully crafted handshake messages.
    (CVE-2014-3510)
  * By sending carefully crafted DTLS packets an attacker could cause openssl
    to leak memory. This can be exploited through a Denial of Service attack.
    (CVE-2014-3507)
  * An attacker can force openssl to consume large amounts of memory whilst
    processing DTLS handshake messages. This can be exploited through a
    Denial of Service attack.
    (CVE-2014-3506)
  * An attacker can force an error condition which causes openssl to crash
    whilst processing DTLS packets due to memory being freed twice. This

OBS-URL: https://build.opensuse.org/request/show/245642
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=121
2014-08-25 09:03:07 +00:00
Stephan Kulow
0dd078bb95 Accepting request 241763 from Base:System
- Move manpages around such that .3 is in openssl-doc
  and .1 in openssl (forwarded request 241758 from jengelh)

OBS-URL: https://build.opensuse.org/request/show/241763
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=120
2014-07-27 06:25:44 +00:00
Stephan Kulow
a57bd6b997 Accepting request 238467 from Base:System
- recommend: ca-certificates-mozilla instead of openssl-certs

OBS-URL: https://build.opensuse.org/request/show/238467
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=119
2014-06-25 13:24:16 +00:00
Stephan Kulow
66d6e48709 Accepting request 236989 from Base:System
NOTE: 

I submitted perl-Net-SSLeay 1.64 update to devel:languages:perl which
fixes its regression.



- updated openssl to 1.0.1h (bnc#880891):
  - CVE-2014-0224: Fix for SSL/TLS MITM flaw. An attacker using a carefully crafted
    handshake can force the use of weak keying material in OpenSSL
    SSL/TLS clients and servers.
  - CVE-2014-0221: Fix DTLS recursion flaw. By sending an invalid DTLS handshake to an
    OpenSSL DTLS client the code can be made to recurse eventually crashing
    in a DoS attack.
  - CVE-2014-0195: Fix DTLS invalid fragment vulnerability. A buffer
    overrun attack can be triggered by sending invalid DTLS fragments to
    an OpenSSL DTLS client or server. This is potentially exploitable to
    run arbitrary code on a vulnerable client or server.
  - CVE-2014-3470: Fix bug in TLS code where clients enable anonymous
    ECDH ciphersuites are subject to a denial of service attack.
- openssl-buffreelistbug-aka-CVE-2010-5298.patch: removed, upstream
- CVE-2014-0198.patch: removed, upstream
- 0009-Fix-double-frees.patch: removed, upstream
- 0012-Fix-eckey_priv_encode.patch: removed, upstream
- 0017-Double-free-in-i2o_ECPublicKey.patch: removed, upstream
- 0018-fix-coverity-issues-966593-966596.patch: removed, upstream
- 0020-Initialize-num-properly.patch: removed, upstream
- 0022-bignum-allow-concurrent-BN_MONT_CTX_set_locked.patch: removed, upstream
- 0023-evp-prevent-underflow-in-base64-decoding.patch: removed, upstream
- 0024-Fixed-NULL-pointer-dereference-in-PKCS7_dataDecode-r.patch: removed, upstream
- 0025-fix-coverity-issue-966597-error-line-is-not-always-i.patch: removed, upstream
- 0001-libcrypto-Hide-library-private-symbols.patch: disabled heartbeat testcase
- openssl-1.0.1c-ipv6-apps.patch: refreshed
- openssl-fix-pod-syntax.diff: some stuff merged upstream, refreshed

- Added new SUSE default cipher suite
  openssl-1.0.1e-add-suse-default-cipher.patch

OBS-URL: https://build.opensuse.org/request/show/236989
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=118
2014-06-18 05:47:41 +00:00
Stephan Kulow
6a3418284a Accepting request 233553 from Base:System
- Add upstream patches fixing coverity scan issues:
* 0018-fix-coverity-issues-966593-966596.patch
* 0020-Initialize-num-properly.patch
* 0022-bignum-allow-concurrent-BN_MONT_CTX_set_locked.patch
* 0023-evp-prevent-underflow-in-base64-decoding.patch
* 0024-Fixed-NULL-pointer-dereference-in-PKCS7_dataDecode-r.patch
* 0025-fix-coverity-issue-966597-error-line-is-not-always-i.patch
- Update 0001-libcrypto-Hide-library-private-symbols.patch
  to cover more private symbols, now 98% complete and probably
  not much more can be done to fix the rest of the ill-defined API.
- openssl-fips-hidden.patch new, hides private symbols added by the
  FIPS patches.
- openssl-no-egd.patch disable the EGD (entropy gathering daemon)
  interface, we have no EGD in the distro and obtaining entropy from
  a place other than /dev/*random, the hardware rng or the openSSL
  internal PRNG is an extremely bad & dangerous idea.
- use secure_getenv instead of getenv everywhere. (forwarded request 233217 from elvigia)

OBS-URL: https://build.opensuse.org/request/show/233553
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=117
2014-05-14 08:26:07 +00:00
Stephan Kulow
94fbf434c7 Accepting request 232889 from Base:System
-  0005-libssl-Hide-library-private-symbols.patch
   Update to hide more symbols that are not part of
   the public API
- openssl-gcc-attributes.patch BUF_memdup also
  needs attribute alloc_size as it returns memory
  of size of the second parameter.
- openssl-ocloexec.patch Update, accept()
  also needs O_CLOEXEC.
- 0009-Fix-double-frees.patch, 0017-Double-free-in-i2o_ECPublicKey.patch
  fix various double frees (from upstream)
- 012-Fix-eckey_priv_encode.patch eckey_priv_encode should 
  return an error inmediately on failure of i2d_ECPrivateKey (from upstream)
- 0001-Axe-builtin-printf-implementation-use-glibc-instead.patch 
  From libressl, modified to work on linux systems that do not have
  funopen() but fopencookie() instead.
  Once upon a time, OS didn't have snprintf, which caused openssl to
  bundle a *printf implementation. We know better nowadays, the glibc
  implementation has buffer overflow checking, has sane failure modes
  deal properly with threads, signals..etc..
 
- build with -fno-common as well. (forwarded request 232752 from elvigia)

OBS-URL: https://build.opensuse.org/request/show/232889
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=116
2014-05-09 04:57:35 +00:00
Stephan Kulow
191f308eaf Accepting request 232653 from Base:System
Fixed bug[ bnc#876282], CVE-2014-0198 openssl: OpenSSL NULL pointer dereference in do_ssl3_write; Add file: CVE-2014-0198.patch (forwarded request 232650 from shawn2012)

OBS-URL: https://build.opensuse.org/request/show/232653
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=115
2014-05-06 11:39:32 +00:00
Stephan Kulow
0bb9b0ad33 Accepting request 231108 from Base:System
- Build everything with full RELRO (-Wl,-z,relro,-z,now)
- Remove -fstack-protector from the hardcoded build options
  it is already in RPM_OPT_FLAGS and is replaced by 
  -fstack-protector-strong with gcc 4.9

- Remove the "gmp" and "capi" shared engines, nobody noticed 
  but they are just dummies that do nothing. 

- Use enable-rfc3779 to allow projects such as rpki.net 
  to work in openSUSE and match the functionality
  available in Debian/Fedora/etc

- openssl-buffreelistbug-aka-CVE-2010-5298.patch fix 
  CVE-2010-5298 and disable the internal BUF_FREELISTS
  functionality. it hides bugs like heartbleed and is
  there only for systems on which malloc() free() are slow.
- ensure we export MALLOC_CHECK and PERTURB during the test
  suite, now that the freelist functionality is disabled it
  will help to catch bugs before they hit users.

- openssl-libssl-noweakciphers.patch do not offer "export"
  or "low" quality ciphers by default. using such ciphers
  is not forbidden but requires an explicit request

- openssl-gcc-attributes.patch: fix thinko, CRYPTO_realloc_clean does 
  not return memory of "num * old_num" but only "num" size
  fortunately this function is currently unused. (forwarded request 230868 from elvigia)

OBS-URL: https://build.opensuse.org/request/show/231108
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=114
2014-04-26 15:01:45 +00:00