SHA256
1
0
forked from pool/openssl-1_1

173 Commits

Author SHA256 Message Date
5c42b46766 Accepting request 1189541 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1189541
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=61
2024-07-26 14:14:59 +00:00
2cb6568415 Accepting request 1183229 from security:tls
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/1183229
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=60
2024-06-28 13:46:43 +00:00
Otto Hollmann
58799edc59 Accepting request 1181542 from home:jamborm:gcc14fixes
- Fixed C99 violations in patches bsc1185319-FIPS-KAT-for-ECDSA.patch
  (need to for explicity typecast) and
  openssl-1_1-fips-list-only-approved-digest-and-pubkey-algorithms.patch
  (missing include) to allow the package to build with GCC 14.
  [boo#1225907]

OBS-URL: https://build.opensuse.org/request/show/1181542
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=162
2024-06-19 09:54:20 +00:00
b303f421d6 Accepting request 1172432 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1172432
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=59
2024-05-08 09:38:58 +00:00
Otto Hollmann
9f776e8d93 Accepting request 1172426 from home:ohollmann:branches:security:tls
- Security fix: [bsc#1222548, CVE-2024-2511]
  * Fix unconstrained session cache growth in TLSv1.3
  * Add openssl-CVE-2024-2511.patch

OBS-URL: https://build.opensuse.org/request/show/1172426
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=160
2024-05-07 12:42:09 +00:00
4b12eccbeb Accepting request 1146592 from security:tls
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/1146592
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=58
2024-02-15 19:59:15 +00:00
6ec88babc3 Accepting request 1144566 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1144566
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=57
2024-02-08 18:01:57 +00:00
Otto Hollmann
153dccd656 Accepting request 1144956 from home:pmonrealgonzalez:branches:security:tls
- Enable running the regression tests in FIPS mode.

OBS-URL: https://build.opensuse.org/request/show/1144956
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=157
2024-02-07 15:55:49 +00:00
Otto Hollmann
d7adac4e7f Accepting request 1144565 from home:ohollmann:branches:security:tls
- Rename engines directories to the same name like in SLE:
    /etc/ssl/engines1_1.d -> /etc/ssl/engines1.1.d
    /etc/ssl/engdef1_1.d -> /etc/ssl/engdef1.1.d
  * Add migration script to move files (bsc#1219562)
    /etc/ssl/engines.d/* -> /etc/ssl/engines1.1.d
    /etc/ssl/engdef.d/* -> /etc/ssl/engdef1.1.d

- Security fix: [bsc#1219243, CVE-2024-0727]
  * Add NULL checks where ContentInfo data can be NULL
  * Add openssl-CVE-2024-0727.patch

OBS-URL: https://build.opensuse.org/request/show/1144565
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=156
2024-02-06 12:52:41 +00:00
428491c2b0 Accepting request 1141238 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1141238
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=56
2024-01-25 17:39:52 +00:00
11b0eddfc3 Accepting request 1141235 from home:ohollmann:branches:security:tls
- Because OpenSSL 1.1.1 is no longer default, let's rename engine
  directories to contain version of OpenSSL and let unversioned for
  the default OpenSSL. [bsc#1194187, bsc#1207472, bsc#1218933]
  * /etc/ssl/engines.d ->  /etc/ssl/engines1_1.d
  * /etc/ssl/engdef.d -> /etc/ssl/engdef1_1.d
  * Update patches:
    - openssl-1_1-ossl-sli-002-ran-make-update.patch
    - openssl-1_1-use-include-directive.patch

OBS-URL: https://build.opensuse.org/request/show/1141235
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=154
2024-01-24 12:36:49 +00:00
b7632f2b6b Accepting request 1130033 from security:tls
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/1130033
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=55
2023-12-01 20:24:50 +00:00
Otto Hollmann
f18ebf3adf Accepting request 1128352 from home:ohollmann:branches:security:tls
- Skip SHA1 test in 20-test_dgst.t when in FIPS mode
  * Add openssl-Skip_SHA1-test-in-FIPS-mode.patch
- FIPS: add openssl-1_1-fips-bsc1190652_release_num_in_version_string.patch
  * bsc#1190652 - Provide a service to output module name/identifier
    and version
- Sync patches with SLE:
  * Merge openssl-keep_EVP_KDF_functions_version.patch into
    openssl-1.1.1-evp-kdf.patch
  * Refresh openssl-1_1-fips-bsc1215215_fips_in_version_string.patch
  * Remove openssl-no-date.patch

OBS-URL: https://build.opensuse.org/request/show/1128352
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=152
2023-11-23 14:31:37 +00:00
2e9c11df10 Accepting request 1126787 from security:tls
- Security fix: [bsc#1216922, CVE-2023-5678]
  * Fix excessive time spent in DH check / generation with large Q
    parameter value.
  * Applications that use the functions DH_generate_key() to generate
    an X9.42 DH key may experience long delays. Likewise,
    applications that use DH_check_pub_key(), DH_check_pub_key_ex
    () or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42
    DH parameters may experience long delays. Where the key or
    parameters that are being checked have been obtained from an
    untrusted source this may lead to a Denial of Service.
  * Add openssl-CVE-2023-5678.patch
- Remove trailing spaces from changelog

- Remove a hack for bsc#936563
  bsc936563_hack.patch (bsc#936563)
- Build with no-ssl3, for details on why this is needed read
  require us to patch dependant packages as the relevant
  functions are still available (SSLv3_(client|server)_method)
- openssl.keyring: use Matt Caswells current key.
- openSSL 1.0.1j
- openssl.keyring: the 1.0.1i release was done by
- 012-Fix-eckey_priv_encode.patch eckey_priv_encode should
- 0001-Axe-builtin-printf-implementation-use-glibc-instead.patch
  it is already in RPM_OPT_FLAGS and is replaced by
- Remove the "gmp" and "capi" shared engines, nobody noticed
  but they are just dummies that do nothing.
- Use enable-rfc3779 to allow projects such as rpki.net
- openssl-buffreelistbug-aka-CVE-2010-5298.patch fix
- openssl-gcc-attributes.patch: fix thinko, CRYPTO_realloc_clean does
- openssl-gcc-attributes.patch

OBS-URL: https://build.opensuse.org/request/show/1126787
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=54
2023-11-17 19:48:11 +00:00
Otto Hollmann
6a02bab132 Accepting request 1126087 from home:ohollmann:branches:security:tls
- Security fix: [bsc#1216922, CVE-2023-5678]
  * Fix excessive time spent in DH check / generation with large Q
    parameter value.
  * Applications that use the functions DH_generate_key() to generate
    an X9.42 DH key may experience long delays. Likewise,
    applications that use DH_check_pub_key(), DH_check_pub_key_ex
    () or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42
    DH parameters may experience long delays. Where the key or
    parameters that are being checked have been obtained from an
    untrusted source this may lead to a Denial of Service.
  * Add openssl-CVE-2023-5678.patch
- Remove trailing spaces from changelog

- Remove a hack for bsc#936563
  bsc936563_hack.patch (bsc#936563)
- Build with no-ssl3, for details on why this is needed read
  require us to patch dependant packages as the relevant
  functions are still available (SSLv3_(client|server)_method)
- openssl.keyring: use Matt Caswells current key.
- openSSL 1.0.1j
- openssl.keyring: the 1.0.1i release was done by
- 012-Fix-eckey_priv_encode.patch eckey_priv_encode should
- 0001-Axe-builtin-printf-implementation-use-glibc-instead.patch
  it is already in RPM_OPT_FLAGS and is replaced by
- Remove the "gmp" and "capi" shared engines, nobody noticed
  but they are just dummies that do nothing.
- Use enable-rfc3779 to allow projects such as rpki.net
- openssl-buffreelistbug-aka-CVE-2010-5298.patch fix
- openssl-gcc-attributes.patch: fix thinko, CRYPTO_realloc_clean does
- openssl-gcc-attributes.patch

OBS-URL: https://build.opensuse.org/request/show/1126087
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=150
2023-11-15 09:54:14 +00:00
c5f7b4fa0d Accepting request 1120190 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1120190
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=53
2023-10-26 15:12:05 +00:00
Otto Hollmann
b51c004cd8 Accepting request 1119558 from home:ohollmann:branches:security:tls
- Performance enhancements for cryptography from OpenSSL 3.x
  [jsc#PED-5086, jsc#PED-3514]
  * Add patches:
    - openssl-ec-Use-static-linkage-on-nistp521-felem_-square-mul-.patch
    - openssl-ec-56-bit-Limb-Solinas-Strategy-for-secp384r1.patch
    - openssl-ec-powerpc64le-Add-asm-implementation-of-felem_-squa.patch
    - openssl-ecc-Remove-extraneous-parentheses-in-secp384r1.patch
    - openssl-powerpc-ecc-Fix-stack-allocation-secp384r1-asm.patch
    - openssl-Improve-performance-for-6x-unrolling-with-vpermxor-i.patch

OBS-URL: https://build.opensuse.org/request/show/1119558
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=148
2023-10-25 07:52:22 +00:00
9bf9d51b0a Accepting request 1116068 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1116068
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=52
2023-10-08 10:17:11 +00:00
Otto Hollmann
861b7f632f Accepting request 1116067 from home:ohollmann:branches:security:tls
- Displays "fips" in the version string (bsc#1215215)
  * Add openssl-1_1-fips-bsc1215215_fips_in_version_string.patch

OBS-URL: https://build.opensuse.org/request/show/1116067
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=146
2023-10-06 13:41:55 +00:00
73c9c30222 Accepting request 1111406 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1111406
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=51
2023-09-17 17:28:45 +00:00
8f01c56ec8 Accepting request 1111331 from home:ohollmann:branches:security:tls
- Update to 1.1.1w:
 * Fix POLY1305 MAC implementation corrupting XMM registers on Windows.
   The POLY1305 MAC (message authentication code) implementation in OpenSSL
   does not save the contents of non-volatile XMM registers on Windows 64
   platform when calculating the MAC of data larger than 64 bytes. Before
   returning to the caller all the XMM registers are set to zero rather than
   restoring their previous content. The vulnerable code is used only on newer
   x86_64 processors supporting the AVX512-IFMA instructions.
   The consequences of this kind of internal application state corruption can
   be various - from no consequences, if the calling application does not
   depend on the contents of non-volatile XMM registers at all, to the worst
   consequences, where the attacker could get complete control of the
   application process. However given the contents of the registers are just
   zeroized so the attacker cannot put arbitrary values inside, the most likely
   consequence, if any, would be an incorrect result of some application
   dependent calculations or a crash leading to a denial of service.
   (CVE-2023-4807)

- Add missing FIPS patches from SLE:
  * Add patches:
    - bsc1185319-FIPS-KAT-for-ECDSA.patch
    - bsc1198207-FIPS-add-hash_hmac-drbg-kat.patch
    - openssl-1.1.1-fips-fix-memory-leaks.patch
    - openssl-1_1-FIPS-PBKDF2-KAT-requirements.patch
    - openssl-1_1-FIPS_drbg-rewire.patch
    - openssl-1_1-Zeroization.patch
    - openssl-1_1-fips-drbg-selftest.patch
    - openssl-1_1-fips-list-only-approved-digest-and-pubkey-algorithms.patch
    - openssl-1_1-jitterentropy-3.4.0.patch
    - openssl-1_1-ossl-sli-000-fix-build-error.patch

OBS-URL: https://build.opensuse.org/request/show/1111331
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=144
2023-09-14 19:44:42 +00:00
19fa66a431 Accepting request 1101937 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1101937
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=50
2023-08-02 14:48:14 +00:00
5c433ba865 Accepting request 1101936 from home:pmonrealgonzalez:branches:security:tls
* Update openssl.keyring with the OTC members that sign releases

OBS-URL: https://build.opensuse.org/request/show/1101936
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=142
2023-08-02 10:17:50 +00:00
f8ec18178a Accepting request 1101915 from home:pmonrealgonzalez:branches:security:tls
- Update to 1.1.1v:
  * Fix excessive time spent checking DH q parameter value
    (bsc#1213853, CVE-2023-3817). The function DH_check() performs
    various checks on DH parameters. After fixing CVE-2023-3446 it
    was discovered that a large q parameter value can also trigger
    an overly long computation during some of these checks. A
    correct q value, if present, cannot be larger than the modulus
    p parameter, thus it is unnecessary to perform these checks if
    q is larger than p. If DH_check() is called with such q parameter
    value, DH_CHECK_INVALID_Q_VALUE return flag is set and the
    computationally intensive checks are skipped.
  * Fix DH_check() excessive time with over sized modulus
    (bsc#1213487, CVE-2023-3446). The function DH_check() performs
    various checks on DH parameters. One of those checks confirms
    that the modulus ("p" parameter) is not too large. Trying to use
    a very large modulus is slow and OpenSSL will not normally use
    a modulus which is over 10,000 bits in length. However the
    DH_check() function checks numerous aspects of the key or
    parameters that have been supplied. Some of those checks use the
    supplied modulus value even if it has already been found to be
    too large. A new limit has been added to DH_check of 32,768 bits.
    Supplying a key/parameters with a modulus over this size will
    simply cause DH_check() to fail.
  * Rebase openssl-1_1-openssl-config.patch
  * Remove security patches fixed upstream:
    - openssl-CVE-2023-3446.patch
    - openssl-CVE-2023-3446-test.patch

OBS-URL: https://build.opensuse.org/request/show/1101915
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=141
2023-08-02 10:03:45 +00:00
Otto Hollmann
a620e0aeaf Accepting request 1100559 from home:ohollmann:branches:security:tls
- Dont pass zero length input to EVP_Cipher because assembler
  optimized AES cannot handle zero size. [bsc#1213517]
  * Add openssl-dont-pass-zero-length-input-to-EVP_Cipher.patch

OBS-URL: https://build.opensuse.org/request/show/1100559
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=140
2023-07-25 08:04:18 +00:00
eacff36a04 Accepting request 1099670 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1099670
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=49
2023-07-24 16:12:06 +00:00
2f6ae03793 Accepting request 1099668 from home:pmonrealgonzalez:branches:security:tls
- Security fix: [bsc#1213487, CVE-2023-3446]
  * Fix DH_check() excessive time with over sized modulus.
  * The function DH_check() performs various checks on DH parameters.
    One of those checks confirms that the modulus ("p" parameter) is
    not too large. Trying to use a very large modulus is slow and
    OpenSSL will not normally use a modulus which is over 10,000 bits
    in length.
    However the DH_check() function checks numerous aspects of the
    key or parameters that have been supplied. Some of those checks
    use the supplied modulus value even if it has already been found
    to be too large.
    A new limit has been added to DH_check of 32,768 bits. Supplying
    a key/parameters with a modulus over this size will simply cause
    DH_check() to fail.
  * Add openssl-CVE-2023-3446.patch openssl-CVE-2023-3446-test.patch

OBS-URL: https://build.opensuse.org/request/show/1099668
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=139
2023-07-20 08:42:02 +00:00
62282c4f2b Accepting request 1095762 from security:tls
Reintroduce change, sync with openssl 3.0

OBS-URL: https://build.opensuse.org/request/show/1095762
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=48
2023-06-29 15:27:51 +00:00
6de92f70b8 Revert; change needs to be synced with openssl 3.0 update
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=47
2023-06-28 08:21:17 +00:00
2f3c226fb9 Accepting request 1095609 from security:tls
- Improve cross-package provides/conflicts [boo#1210313]
  * Add Provides/Conflicts: ssl-devel
  * Remove explicit conflicts with other devel-libraries

OBS-URL: https://build.opensuse.org/request/show/1095609
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=46
2023-06-27 21:16:16 +00:00
Otto Hollmann
effdf84ffa Accepting request 1094355 from security:tls:unstable
- Improve cross-package provides/conflicts [boo#1210313]
  * Add Provides/Conflicts: ssl-devel
  * Remove explicit conflicts with other devel-libraries

OBS-URL: https://build.opensuse.org/request/show/1094355
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=136
2023-06-21 13:11:59 +00:00
28cda60acd Accepting request 1089973 from security:tls
- Update to 1.1.1u:
  * Mitigate for the time it takes for `OBJ_obj2txt` to translate gigantic
    OBJECT IDENTIFIER sub-identifiers to canonical numeric text form.
    OBJ_obj2txt() would translate any size OBJECT IDENTIFIER to canonical
    numeric text form.  For gigantic sub-identifiers, this would take a very
    long time, the time complexity being O(n^2) where n is the size of that
    sub-identifier.  (CVE-2023-2650, bsc#1211430)
    To mitigitate this, `OBJ_obj2txt()` will only translate an OBJECT
    IDENTIFIER to canonical numeric text form if the size of that OBJECT
    IDENTIFIER is 586 bytes or less, and fail otherwise.
    The basis for this restriction is RFC 2578 (STD 58), section 3.5. OBJECT
    IDENTIFIER values, which stipulates that OBJECT IDENTIFIERS may have at
    most 128 sub-identifiers, and that the maximum value that each sub-
    identifier may have is 2^32-1 (4294967295 decimal).
    For each byte of every sub-identifier, only the 7 lower bits are part of
    the value, so the maximum amount of bytes that an OBJECT IDENTIFIER with
    these restrictions may occupy is 32 * 128 / 7, which is approximately 586
    bytes.
    Ref: https://datatracker.ietf.org/doc/html/rfc2578#section-3.5
  * Reworked the Fix for the Timing Oracle in RSA Decryption
    (CVE-2022-4304, bsc#1207534). The previous fix for this timing side
    channel turned out to cause a severe 2-3x performance regression in the
    typical use case compared to 1.1.1s. The new fix uses existing constant
    time code paths, and restores the previous performance level while fully
    eliminating all existing timing side channels. The fix was developed by
    Bernd Edlinger with testing support by Hubert Kario.
  * Corrected documentation of X509_VERIFY_PARAM_add0_policy() to mention that
    it does not enable policy checking. Thanks to David Benjamin for
    discovering this issue. (CVE-2023-0466, bsc#1209873)
  * Fixed an issue where invalid certificate policies in leaf certificates are

OBS-URL: https://build.opensuse.org/request/show/1089973
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=45
2023-06-02 22:06:18 +00:00
Otto Hollmann
7cf818f410 Accepting request 1089971 from security:tls:unstable
OBS-URL: https://build.opensuse.org/request/show/1089971
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=134
2023-05-31 09:13:51 +00:00
db074c08d6 Accepting request 1077221 from security:tls
- Security Fix: [CVE-2023-0465, bsc#1209878]
  * Invalid certificate policies in leaf certificates are silently ignored
  * Add openssl-CVE-2023-0465.patch
- Security Fix: [CVE-2023-0466, bsc#1209873]
  * Certificate policy check not enabled
  * Add openssl-CVE-2023-0466.patch

OBS-URL: https://build.opensuse.org/request/show/1077221
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=44
2023-04-06 13:55:53 +00:00
Otto Hollmann
1d1d2b5e7a Accepting request 1076892 from home:ohollmann:branches:security:tls-tmp
- Security Fix: [CVE-2023-0465, bsc#1209878]
  * Invalid certificate policies in leaf certificates are silently ignored
  * Add openssl-CVE-2023-0465.patch
- Security Fix: [CVE-2023-0466, bsc#1209873]
  * Certificate policy check not enabled
  * Add openssl-CVE-2023-0466.patch

OBS-URL: https://build.opensuse.org/request/show/1076892
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=132
2023-04-03 11:03:23 +00:00
42076e4ce0 Accepting request 1074722 from security:tls
- Security Fix: [CVE-2023-0464, bsc#1209624]
  * Excessive Resource Usage Verifying X.509 Policy Constraints
  * Add openssl-CVE-2023-0464.patch

OBS-URL: https://build.opensuse.org/request/show/1074722
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=43
2023-03-29 21:26:47 +00:00
Otto Hollmann
ba8c5e2a55 Accepting request 1074654 from home:ohollmann:branches:security:tls-tmp
- Security Fix: [CVE-2023-0464, bsc#1209624]
  * Excessive Resource Usage Verifying X.509 Policy Constraints
  * Add openssl-CVE-2023-0464.patch

OBS-URL: https://build.opensuse.org/request/show/1074654
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=130
2023-03-27 11:57:25 +00:00
4377a5e5ee Accepting request 1063743 from security:tls
- Update to 1.1.1t:
  * Fixed X.400 address type confusion in X.509 GeneralName.
    There is a type confusion vulnerability relating to X.400 address processing
    inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING
    but subsequently interpreted by GENERAL_NAME_cmp as an ASN1_TYPE. This
    vulnerability may allow an attacker who can provide a certificate chain and
    CRL (neither of which need have a valid signature) to pass arbitrary
    pointers to a memcmp call, creating a possible read primitive, subject to
    some constraints. Refer to the advisory for more information. Thanks to
    David Benjamin for discovering this issue. [bsc#1207533, CVE-2023-0286]
    This issue has been fixed by changing the public header file definition of
    GENERAL_NAME so that x400Address reflects the implementation. It was not
    possible for any existing application to successfully use the existing
    definition; however, if any application references the x400Address field
    (e.g. in dead code), note that the type of this field has changed. There is
    no ABI change.
  * Fixed Use-after-free following BIO_new_NDEF.
    The public API function BIO_new_NDEF is a helper function used for
    streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL
    to support the SMIME, CMS and PKCS7 streaming capabilities, but may also
    be called directly by end user applications.
    The function receives a BIO from the caller, prepends a new BIO_f_asn1
    filter BIO onto the front of it to form a BIO chain, and then returns
    the new head of the BIO chain to the caller. Under certain conditions,
    for example if a CMS recipient public key is invalid, the new filter BIO
    is freed and the function returns a NULL result indicating a failure.
    However, in this case, the BIO chain is not properly cleaned up and the
    BIO passed by the caller still retains internal pointers to the previously
    freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO
    then a use-after-free will occur. This will most likely result in a crash.

OBS-URL: https://build.opensuse.org/request/show/1063743
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=42
2023-02-14 15:44:47 +00:00
Otto Hollmann
8fb8948616 Accepting request 1063668 from home:ohollmann:branches:security:tls
- Update to 1.1.1t:
  * Fixed X.400 address type confusion in X.509 GeneralName.
    There is a type confusion vulnerability relating to X.400 address processing
    inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING
    but subsequently interpreted by GENERAL_NAME_cmp as an ASN1_TYPE. This
    vulnerability may allow an attacker who can provide a certificate chain and
    CRL (neither of which need have a valid signature) to pass arbitrary
    pointers to a memcmp call, creating a possible read primitive, subject to
    some constraints. Refer to the advisory for more information. Thanks to
    David Benjamin for discovering this issue. [bsc#1207533, CVE-2023-0286]
    This issue has been fixed by changing the public header file definition of
    GENERAL_NAME so that x400Address reflects the implementation. It was not
    possible for any existing application to successfully use the existing
    definition; however, if any application references the x400Address field
    (e.g. in dead code), note that the type of this field has changed. There is
    no ABI change.
  * Fixed Use-after-free following BIO_new_NDEF.
    The public API function BIO_new_NDEF is a helper function used for
    streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL
    to support the SMIME, CMS and PKCS7 streaming capabilities, but may also
    be called directly by end user applications.
    The function receives a BIO from the caller, prepends a new BIO_f_asn1
    filter BIO onto the front of it to form a BIO chain, and then returns
    the new head of the BIO chain to the caller. Under certain conditions,
    for example if a CMS recipient public key is invalid, the new filter BIO
    is freed and the function returns a NULL result indicating a failure.
    However, in this case, the BIO chain is not properly cleaned up and the
    BIO passed by the caller still retains internal pointers to the previously
    freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO
    then a use-after-free will occur. This will most likely result in a crash.

OBS-URL: https://build.opensuse.org/request/show/1063668
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=128
2023-02-08 08:03:11 +00:00
11ddbc986a Accepting request 1062225 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1062225
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=41
2023-02-02 17:08:04 +00:00
6d27aa3f13 Accepting request 1062217 from security:tls:unstable
- Set OpenSSL 3.0 as the default openssl [bsc#1205042]
  * For compatibility with OpenSSL 3.0, the OpenSSL master
    configuration file openssl.cnf has been renamed to
    openssl-1_1.cnf. The executables openssl, c_rehash, CA.pl and
    tsget.pl have been also renamed to openssl-1_1, c_rehash-1_1,
    CA-1_1.pl and tsget-1_1.pl, respectively.
  * Add openssl-1_1-devel as conflicting with libopenssl-3-devel
  * Add openssl-1_1-openssl-config.patch

OBS-URL: https://build.opensuse.org/request/show/1062217
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=126
2023-01-31 12:15:21 +00:00
1db74d6acf Accepting request 1042988 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1042988
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=40
2022-12-18 16:22:17 +00:00
93c266235b Accepting request 1042984 from home:ohollmann:branches:security:tls
OBS-URL: https://build.opensuse.org/request/show/1042984
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=124
2022-12-14 20:20:45 +00:00
Otto Hollmann
0ce74d253b Accepting request 1042846 from home:ohollmann:branches:security:tls
- POWER10 performance enhancements for cryptography [jsc#PED-512]
  * openssl-1_1-AES-GCM-performance-optimzation-with-stitched-method.patch
  * openssl-1_1-Fixed-counter-overflow.patch
  * openssl-1_1-chacha20-performance-optimizations-for-ppc64le-with-.patch
  * openssl-1_1-Fixed-conditional-statement-testing-64-and-256-bytes.patch
  * openssl-1_1-Fix-AES-GCM-on-Power-8-CPUs.patch

OBS-URL: https://build.opensuse.org/request/show/1042846
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=123
2022-12-14 09:46:30 +00:00
48848f012a Accepting request 1032895 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1032895
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=39
2022-11-03 18:12:58 +00:00
4cf96f27f1 Accepting request 1032887 from home:ohollmann:branches:security:tls
- Updated openssl.keyring with key A21FAB74B0088AA361152586B8EF1A6BA9DA2D5C
- Update to 1.1.1s:
  * Fixed a regression introduced in 1.1.1r version not refreshing the
    certificate data to be signed before signing the certificate.
- Update to 1.1.1r:
  * Fixed the linux-mips64 Configure target which was missing the
    SIXTY_FOUR_BIT bn_ops flag. This was causing heap corruption on that
    platform.
  * Fixed a strict aliasing problem in bn_nist. Clang-14 optimisation was
    causing incorrect results in some cases as a result.
  * Fixed SSL_pending() and SSL_has_pending() with DTLS which were failing to
    report correct results in some cases
  * Fixed a regression introduced in 1.1.1o for re-signing certificates with
    different key sizes
  * Added the loongarch64 target
  * Fixed a DRBG seed propagation thread safety issue
  * Fixed a memory leak in tls13_generate_secret
  * Fixed reported performance degradation on aarch64. Restored the
    implementation prior to commit 2621751 ("aes/asm/aesv8-armx.pl: avoid
    32-bit lane assignment in CTR mode") for 64bit targets only, since it is
    reportedly 2-17% slower and the silicon errata only affects 32bit targets.
    The new algorithm is still used for 32 bit targets.
  * Added a missing header for memcmp that caused compilation failure on some
    platforms

OBS-URL: https://build.opensuse.org/request/show/1032887
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=121
2022-11-02 13:56:40 +00:00
f932996074 Accepting request 1007224 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1007224
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=38
2022-10-01 15:41:27 +00:00
ba6be953da Accepting request 1007029 from home:ohollmann:branches:home:jsikes:branches:security:tls
- Added openssl-1_1-paramgen-default_to_rfc7919.patch
  * bsc#1180995
  * Default to RFC7919 groups when generating ECDH parameters
    using 'genpkey' or 'dhparam' in FIPS mode.

OBS-URL: https://build.opensuse.org/request/show/1007029
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=119
2022-09-30 10:26:12 +00:00
c72c767e80 Accepting request 987305 from security:tls
OBS-URL: https://build.opensuse.org/request/show/987305
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=37
2022-07-08 12:01:24 +00:00
Jason Sikes
bc10d3dbd2 Accepting request 987301 from home:jsikes:branches:security:tls
Fixed CVE-2022-2097. Enjoy!

OBS-URL: https://build.opensuse.org/request/show/987301
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=117
2022-07-07 02:51:21 +00:00
Jason Sikes
71b469adbb Accepting request 985766 from home:Andreas_Schwab:Factory
- openssl-riscv64-config.patch: backport of riscv64 config support

OBS-URL: https://build.opensuse.org/request/show/985766
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=116
2022-07-07 02:47:54 +00:00
32bcc01e6d Accepting request 985235 from security:tls
OBS-URL: https://build.opensuse.org/request/show/985235
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=36
2022-06-28 13:21:07 +00:00
Jason Sikes
282de1dff4 Accepting request 984626 from home:jsikes:branches:security:tls
update to 1.1.1p. Enjoy!

OBS-URL: https://build.opensuse.org/request/show/984626
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=114
2022-06-27 07:21:15 +00:00
af41bdf3bd Accepting request 981089 from security:tls
- Update to 1.1.1o: [CVE-2022-1292, bsc#1199166]
  * Fixed a bug in the c_rehash script which was not properly sanitising
    shell metacharacters to prevent command injection.
  * Rebased openssl-s390x-assembly-pack-add-OPENSSL_s390xcap-environment.patch
  * Rebased openssl-s390x-assembly-pack-add-support-for-pcc-and-kma-inst.patch
- Added openssl-update_expired_certificates.patch
  * Openssl failed tests because of expired certificates.
  * bsc#1185637
  * Sourced from https://github.com/openssl/openssl/pull/18446/commits

OBS-URL: https://build.opensuse.org/request/show/981089
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=35
2022-06-09 12:09:46 +00:00
9e96c4741f OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=112 2022-06-07 06:45:15 +00:00
57ab29103c Accepting request 980599 from home:jsikes:branches:security:tls
Fixed CVE-2022-1292 and updated expired certificates. Enjoy!

OBS-URL: https://build.opensuse.org/request/show/980599
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=111
2022-06-07 06:28:40 +00:00
020eadbe13 Accepting request 961992 from security:tls
OBS-URL: https://build.opensuse.org/request/show/961992
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=34
2022-03-17 16:01:24 +00:00
eb052185fb Accepting request 961990 from home:pmonrealgonzalez:branches:security:tls
- Update to 1.1.1n: [bsc#1196877, CVE-2022-0778]
  * Security fix [CVE-2022-0778]: Infinite loop for non-prime moduli
    in BN_mod_sqrt() reachable when parsing certificates.
  * Add ciphersuites based on DHE_PSK (RFC 4279) and ECDHE_PSK
    (RFC 5489) to the list of ciphersuites providing Perfect Forward
    Secrecy as required by SECLEVEL >= 3.
  * Rebase openssl-1.1.1-fips.patch openssl-1.1.1-evp-kdf.patch

OBS-URL: https://build.opensuse.org/request/show/961990
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=109
2022-03-15 18:24:32 +00:00
7812ff217a Accepting request 960473 from security:tls
OBS-URL: https://build.opensuse.org/request/show/960473
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=33
2022-03-11 20:39:43 +00:00
8cce2e6a14 Accepting request 960455 from home:pmonrealgonzalez:branches:security:tls
- Security fix: [bsc#1192820, CVE-2002-20001]
  * Fix DHEATER: The Diffie-Hellman Key Agreement Protocol allows
    remote attackers (from the client side) to send arbitrary
    numbers that are actually not public keys, and trigger
    expensive server-side DHE calculation.
  * Stop recommending the DHE in SSL_DEFAULT_SUSE_CIPHER_LIST
  * Rebase openssl-DEFAULT_SUSE_cipher.patch

- Fix the engines section in /etc/ssl/openssl.cnf [bsc#1194187]
  * In an INI-type file, the sections begin with a [section_name]
    and they run until the next section begins.
  * Rebase openssl-1_1-use-include-directive.patch

OBS-URL: https://build.opensuse.org/request/show/960455
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=107
2022-03-09 11:25:28 +00:00
bcde5a1d7a Accepting request 954341 from security:tls
- Pull libopenssl-1_1 when updating openssl-1_1 with the same
  version. [bsc#1195792]

- FIPS: Fix function and reason error codes [bsc#1182959]
  * Add openssl-1_1-FIPS-fix-error-reason-codes.patch

OBS-URL: https://build.opensuse.org/request/show/954341
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=32
2022-02-15 22:56:57 +00:00
66f0a2e283 Accepting request 954339 from home:pmonrealgonzalez:branches:security:tls
OBS-URL: https://build.opensuse.org/request/show/954339
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=106
2022-02-14 15:41:59 +00:00
5a8d36f4fd Accepting request 954189 from home:pmonrealgonzalez:branches:security:tls
- Pull libopenssl-1_1 when updating openssl-1_1 with the same
  version. [bsc#1195792]

- FIPS: Fix function and reason error codes [bsc#1182959]
  * Add openssl-1_1-FIPS-fix-error-reason-codes.patch

OBS-URL: https://build.opensuse.org/request/show/954189
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=105
2022-02-14 12:37:47 +00:00
9119d6bfb8 Accepting request 951364 from security:tls
OBS-URL: https://build.opensuse.org/request/show/951364
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=31
2022-02-05 22:22:59 +00:00
7f50aa7dba Accepting request 951360 from home:pmonrealgonzalez:branches:security:tls
- Enable zlib compression support [bsc#1195149]

OBS-URL: https://build.opensuse.org/request/show/951360
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=104
2022-02-03 17:41:11 +00:00
e71c296884 Accepting request 950464 from home:pmonrealgonzalez:branches:security:tls
- Backport cryptographic improvements from OpenSSL 3 [jsc#SLE-19742]
- POWER10 performance enhancements for cryptography [jsc#SLE-18136]

OBS-URL: https://build.opensuse.org/request/show/950464
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=103
2022-02-01 15:05:00 +00:00
8903999f6a Accepting request 949750 from home:pmonrealgonzalez:branches:security:tls
- Backport cryptographic improvements from OpenSSL 3 [jsc#SLE-19766]
  * Optimize RSA on armv8: openssl-1_1-Optimize-RSA-armv8.patch
  * Optimize AES-XTS mode for aarch64:
    openssl-1_1-Optimize-AES-XTS-aarch64.patch
  * Optimize AES-GCM for uarchs with unroll and new instructions:
    openssl-1_1-Optimize-AES-GCM-uarchs.patch

- POWER10 performance enhancements for cryptography [jsc#SLE-19409]
  * openssl-1_1-Optimize-ppc64.patch

OBS-URL: https://build.opensuse.org/request/show/949750
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=102
2022-01-28 17:51:43 +00:00
2cdc16e06a Accepting request 943542 from security:tls
OBS-URL: https://build.opensuse.org/request/show/943542
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=30
2022-01-07 11:44:23 +00:00
4ef4397187 Accepting request 942952 from home:pmonrealgonzalez:branches:security:tls
- Update to 1.1.1m:
  * Avoid loading of a dynamic engine twice.
  * Prioritise DANE TLSA issuer certs over peer certs
- Rebased patches:
  * openssl-1.1.1-evp-kdf.patch
  * openssl-1.1.1-system-cipherlist.patch

- Enforce crypto-policies for the upcoming Leap 15.4 and SLE 15-SP4

OBS-URL: https://build.opensuse.org/request/show/942952
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=101
2022-01-03 08:42:13 +00:00
5f529e794d Accepting request 940471 from security:tls
OBS-URL: https://build.opensuse.org/request/show/940471
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=29
2021-12-18 19:29:54 +00:00
c13b2fd4bf Accepting request 936137 from home:markkp:branches:security:tls
- Added openssl-1_1-use-include-directive.patch so that the default
  /etc/ssl/openssl.cnf file will include any configuration files that
  other packages might place into /etc/ssl/engines.d/ and
  /etc/ssl/engdef.d/ This is a fix for bsc#1004463 where scripting was
  being used to modify the openssl.cnf file. The scripting would fail
  if either the default openssl.cnf file, or the sample openssl-ibmca
  configuration file would be changed by upstream.
- Updated spec file to create the two new necessary directores for
  the above patch.

OBS-URL: https://build.opensuse.org/request/show/936137
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=100
2021-12-14 12:43:58 +00:00
de911df7f8 Accepting request 934684 from security:tls
OBS-URL: https://build.opensuse.org/request/show/934684
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=28
2021-12-05 21:45:45 +00:00
81ba30e4f7 Accepting request 930969 from home:gbelinassi
- Add support for livepatches (jsc#SLE-20049).
- Generate ipa-clones tarball artifact when livepatching is enabled.

Userspace Livepatching allows your application to be updated without restarting. For a library to be livepatchable, it has to be compiled with special flags (-fpatchable-functions-entry=X,Y).

To aid the development of livepatches, ipa-clones are also generated in the build process and packed into a livepatch tarball. This tarball is meant to be used by developers during their workflow: these files contains log of changes that gcc did in the compiled code that may change code layout, which must be accounted when developing a livepatch. For instance, livepatching a function which is inlined requires livepatching every function that calls it. Tools that use such files already exists in kernel-livepatching and we aim porting them to userspace livepatching as well.

OBS-URL: https://build.opensuse.org/request/show/930969
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=99
2021-11-30 09:07:05 +00:00
031c49bd14 Accepting request 928526 from home:dancermak:branches:security:tls
Drop openssl-no-date.patch

OBS-URL: https://build.opensuse.org/request/show/928526
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=98
2021-11-22 18:47:15 +00:00
863b688e84 Accepting request 930407 from security:tls
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/930407
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=27
2021-11-11 20:35:46 +00:00
adc35a7f9e Accepting request 928745 from home:gladiac:branches:security:tls
- Add missing libopenssl1_1-hmac 32bit package

OBS-URL: https://build.opensuse.org/request/show/928745
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=97
2021-11-05 12:49:39 +00:00
b0d056e146 Accepting request 914095 from security:tls
OBS-URL: https://build.opensuse.org/request/show/914095
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=26
2021-08-28 20:28:35 +00:00
Jason Sikes
f21d23e877 Accepting request 914079 from home:pmonrealgonzalez:branches:security:tls
- Update to 1.1.1l:
  * [bsc#1189520, CVE-2021-3711] Fixed an SM2 Decryption Buffer Overflow.
  * [bsc#1189521, CVE-2021-3712] Fixed various read buffer overruns
    processing ASN.1 strings

- Require the crypto-policies package from libopenssl-1_1

OBS-URL: https://build.opensuse.org/request/show/914079
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=96
2021-08-25 02:52:01 +00:00
11b1c70b4c Accepting request 906782 from security:tls
OBS-URL: https://build.opensuse.org/request/show/906782
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=25
2021-07-21 17:05:32 +00:00
bbd5132f50 Accepting request 906749 from home:jsikes:branches:security:tls
New candidate fix for bsc1180995. Enjoy!

OBS-URL: https://build.opensuse.org/request/show/906749
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=95
2021-07-17 07:22:41 +00:00
15122a3c70 Accepting request 895194 from home:jsikes:branches:security:tls
Fixed error in spec file. Enjoy!

OBS-URL: https://build.opensuse.org/request/show/895194
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=94
2021-05-24 15:50:42 +00:00
9119842a93 Accepting request 886506 from security:tls
OBS-URL: https://build.opensuse.org/request/show/886506
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=24
2021-04-19 19:06:14 +00:00
Jason Sikes
7d266d26c5 Accepting request 886496 from home:jsikes:branches:security:tls
Added bsc numbers to changelog.

OBS-URL: https://build.opensuse.org/request/show/886496
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=92
2021-04-18 23:41:13 +00:00
Richard Brown
f4f7fdf3c5 Accepting request 882115 from security:tls
OBS-URL: https://build.opensuse.org/request/show/882115
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=23
2021-04-08 19:01:22 +00:00
Jason Sikes
abf147163e Accepting request 882114 from home:jsikes:branches:security:tls
Update to 1.1.1k with CVE fixes. Enjoy!

OBS-URL: https://build.opensuse.org/request/show/882114
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=90
2021-03-30 07:22:25 +00:00
Jason Sikes
2a418dd2f6 Accepting request 881422 from home:jsikes:branches:security:tls
Updated to 1.1.1k. Enjoy!

OBS-URL: https://build.opensuse.org/request/show/881422
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=89
2021-03-25 23:47:36 +00:00
3ae49ce958 Accepting request 878152 from security:tls
OBS-URL: https://build.opensuse.org/request/show/878152
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=22
2021-03-12 12:30:28 +00:00
50473db176 Accepting request 876739 from home:pmonrealgonzalez:branches:security:tls
- Fix unresolved error codes [bsc#1182959]
- Update patches:
  * openssl-1.1.1-fips.patch
  * openssl-1.1.1-evp-kdf.patch

OBS-URL: https://build.opensuse.org/request/show/876739
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=87
2021-03-10 11:16:54 +00:00
Richard Brown
9548fda780 Accepting request 874306 from security:tls
OBS-URL: https://build.opensuse.org/request/show/874306
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=21
2021-03-03 17:33:24 +00:00
a13839c7c6 Accepting request 873674 from home:pmonrealgonzalez:branches:security:tls
- Update to 1.1.1j
  * Fixed the X509_issuer_and_serial_hash() function. It attempts
    to create a unique hash value based on the issuer and serial
    number data contained within an X509 certificate. However it
    was failing to correctly handle any errors that may occur
    while parsing the issuer field [bsc#1182331, CVE-2021-23841]
  * Fixed the RSA_padding_check_SSLv23() function and the
    RSA_SSLV23_PADDING padding mode to correctly check for
    rollback attacks.
  * Fixed the EVP_CipherUpdate, EVP_EncryptUpdate and
    EVP_DecryptUpdate functions. Previously they could overflow the
    output length argument in some cases where the input length is
    close to the maximum permissable length for an integer on the
    platform. In such cases the return value from the function call
    would be 1 (indicating success), but the output length value
    would be negative. This could cause applications to behave
    incorrectly or crash. [bsc#1182333, CVE-2021-23840]
  * Fixed SRP_Calc_client_key so that it runs in constant time.
    The previous implementation called BN_mod_exp without setting
    BN_FLG_CONSTTIME. This could be exploited in a side channel
    attack to recover the password. Since the attack is local host
    only this is outside of the current OpenSSL threat model and
    therefore no CVE is assigned.
- Rebase patches:
  * openssl-1.1.1-fips.patch
  * openssl-1.1.0-issuer-hash.patch
  * openssl-1.1.1-evp-kdf.patch

- Add version guards for the crypto-policies

OBS-URL: https://build.opensuse.org/request/show/873674
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=85
2021-02-22 12:20:01 +00:00
Jason Sikes
1f67f5cc44 Accepting request 869986 from home:jsikes:branches:security:tls
Small change to undo another small change. Sorry.

OBS-URL: https://build.opensuse.org/request/show/869986
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=84
2021-02-06 23:06:18 +00:00
083820900d Accepting request 869551 from home:jsikes:branches:security:tls
Small fix. Enjoy!

OBS-URL: https://build.opensuse.org/request/show/869551
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=83
2021-02-05 15:53:45 +00:00
3d07044ba3 Accepting request 865443 from home:pmonrealgonzalez:branches:security:tls
- Disable test_srp subsection from 90-test_sslapi.t test
- Use SECLEVEL 2 in 80-test_ssl_new.t
- Add patches:
  * openssl-1_1-use-seclevel2-in-tests.patch
  * openssl-1_1-disable-test_srp-sslapi.patch

- Allow SHA1 in SECLEVEL 2 in non-FIPS mode
- Add openssl-1_1-seclevel.patch

OBS-URL: https://build.opensuse.org/request/show/865443
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=82
2021-01-21 14:53:39 +00:00
3a839dd9e9 - Require the crypto-policies package [bsc#1180051]
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=81
2021-01-07 13:09:26 +00:00
15b55e8cea OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=80 2021-01-07 12:04:52 +00:00
0e5c7b7193 Accepting request 858095 from home:pmonrealgonzalez:branches:security:tls
- Require the crypto-policies package [bsc#1180051]

OBS-URL: https://build.opensuse.org/request/show/858095
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=79
2020-12-22 09:44:19 +00:00
e594dc44e4 Accepting request 853304 from security:tls
OBS-URL: https://build.opensuse.org/request/show/853304
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=20
2020-12-16 09:58:44 +00:00
55671aee4d Accepting request 855722 from home:pmonrealgonzalez:branches:security:tls
- Refresh openssl-1.1.1-fips-post-rand.patch

OBS-URL: https://build.opensuse.org/request/show/855722
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=77
2020-12-14 11:22:02 +00:00
ae4e19d8e5 Accepting request 854071 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1i (bsc#1179491)
  * Fixed NULL pointer deref in GENERAL_NAME_cmp (CVE-2020-1971)

OBS-URL: https://build.opensuse.org/request/show/854071
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=76
2020-12-14 11:20:34 +00:00
a44c4ab57f Accepting request 850541 from home:vitezslav_cizek:branches:security:tls
Don't forward to Factory yet. Needs more testing.

- Use the centralized crypto policy profile (jsc#SLE-15832)
  * add openssl-1.1.1-system-cipherlist.patch from Fedora

OBS-URL: https://build.opensuse.org/request/show/850541
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=75
2020-12-05 17:19:30 +00:00
af7a8f80d6 Accepting request 841379 from security:tls
OBS-URL: https://build.opensuse.org/request/show/841379
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=19
2020-10-18 14:17:49 +00:00
Tomáš Chvátal
7be8052908 Accepting request 841314 from home:dimstar:Factory
- Escape rpm command %%expand when used in comment.

Fix build with RPM 4.16, see
https://build.opensuse.org/package/live_build_log/openSUSE:Factory:Staging:A/openssl-1_1/standard/x86_64

OBS-URL: https://build.opensuse.org/request/show/841314
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=73
2020-10-13 05:14:08 +00:00
5cbee84ef1 Accepting request 836174 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1h
  * Disallow explicit curve parameters in verifications chains when X509_V_FLAG_X509_STRICT is used
  * Enable 'MinProtocol' and 'MaxProtocol' to configure both TLS and DTLS contexts
- refresh openssl-fips_selftest_upstream_drbg.patch
  * DRBG internals got renamed back:
    reseed_gen_counter  -> generate_counter
    reseed_prop_counter -> reseed_counter

OBS-URL: https://build.opensuse.org/request/show/836174
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=72
2020-09-23 06:41:06 +00:00
8a0b3e7ace Accepting request 805875 from security:tls
OBS-URL: https://build.opensuse.org/request/show/805875
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=18
2020-05-19 12:43:15 +00:00
e4417781b1 Accepting request 805872 from home:vitezslav_cizek:branches:security:tls
- Limit the DRBG selftests to not deplete entropy (bsc#1165274)
  * fixes also Firefox crashing with Kerberos (bsc#1167132)
  * update openssl-fips_selftest_upstream_drbg.patch

OBS-URL: https://build.opensuse.org/request/show/805872
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=70
2020-05-15 15:20:55 +00:00
0d743beb17 Accepting request 796090 from security:tls
OBS-URL: https://build.opensuse.org/request/show/796090
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=17
2020-04-27 21:27:46 +00:00
Martin Pluskal
5a11d9c32d Accepting request 796077 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1g
  * Fixed segmentation fault in SSL_check_chain (CVE-2020-1967, bsc#1169407)
    Server or client applications that call the SSL_check_chain() function
    during or after a TLS 1.3 handshake may crash due to a NULL pointer
    dereference as a result of incorrect handling of the
    "signature_algorithms_cert" TLS extension. The crash occurs if an invalid
    or unrecognised signature algorithm is received from the peer. This could
    be exploited by a malicious peer in a Denial of Service attack.
  * Added AES consttime code for no-asm configurations
    an optional constant time support for AES was added
    when building openssl for no-asm.
- refresh patches:
   * openssl-1.1.1-fips.patch
   * openssl-1.1.1-fips-crng-test.patch

OBS-URL: https://build.opensuse.org/request/show/796077
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=68
2020-04-21 15:13:15 +00:00
5b13303a59 Accepting request 790184 from security:tls
OBS-URL: https://build.opensuse.org/request/show/790184
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=16
2020-04-02 15:42:25 +00:00
fc87bd7e12 Accepting request 790182 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1f
  * Revert the unexpected EOF reporting via SSL_ERROR_SSL
- refresh openssl-1.1.0-no-html.patch

OBS-URL: https://build.opensuse.org/request/show/790182
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=66
2020-03-31 14:27:13 +00:00
32ced036f1 Accepting request 786956 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1e
  * Properly detect EOF while reading in libssl. Previously if we hit an EOF
    while reading in libssl then we would report an error back to the
    application (SSL_ERROR_SYSCALL) but errno would be 0. We now add
    an error to the stack (which means we instead return SSL_ERROR_SSL) and
    therefore give a hint as to what went wrong.
  * Check that ed25519 and ed448 are allowed by the security level. Previously
    signature algorithms not using an MD were not being checked that they were
    allowed by the security level.
  * Fixed SSL_get_servername() behaviour. The behaviour of SSL_get_servername()
    was not quite right. The behaviour was not consistent between resumption
    and normal handshakes, and also not quite consistent with historical
    behaviour. The behaviour in various scenarios has been clarified and
    it has been updated to make it match historical behaviour as closely as
    possible.
  * Corrected the documentation of the return values from the EVP_DigestSign*
    set of functions.  The documentation mentioned negative values for some
    errors, but this was never the case, so the mention of negative values
    was removed.
  * Added a new method to gather entropy on VMS, based on SYS$GET_ENTROPY.
    The presence of this system service is determined at run-time.
  * Added newline escaping functionality to a filename when using openssl dgst.
    This output format is to replicate the output format found in the '*sum'
    checksum programs. This aims to preserve backward compatibility.
  * Print all values for a PKCS#12 attribute with 'openssl pkcs12', not just
    the first value.
- Update bunch of patches as the internal crypto headers got reorganized
- drop openssl-1_1-CVE-2019-1551.patch (upstream)

- openssl dgst: default to SHA256 only when called without a digest,

OBS-URL: https://build.opensuse.org/request/show/786956
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=65
2020-03-20 17:43:35 +00:00
659e2d5f28 Accepting request 780187 from security:tls
OBS-URL: https://build.opensuse.org/request/show/780187
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=15
2020-03-01 20:26:08 +00:00
Vítězslav Čížek
8e4d5710d8 Accepting request 780178 from home:vitezslav_cizek:branches:security:tls
- Run FIPS DRBG selftests against the crypto/rand DRBG implementation
  (bsc#1164557)
  * add openssl-fips_selftest_upstream_drbg.patch

OBS-URL: https://build.opensuse.org/request/show/780178
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=63
2020-02-28 09:10:25 +00:00
42d434a07f Accepting request 778018 from security:tls
OBS-URL: https://build.opensuse.org/request/show/778018
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=14
2020-02-24 14:49:54 +00:00
92e6fcbee3 Accepting request 778004 from home:vitezslav_cizek:branches:security:tls
- Use the newly build libcrypto shared library when computing the hmac
  checksums in order to avoid a bootstrapping issue by BuildRequiring
  libopenssl1_1 (bsc#1164102)

- Fix wrong return values of FIPS DSA and ECDH selftests (bsc#1163569)
  * add openssl-fips_fix_selftests_return_value.patch

OBS-URL: https://build.opensuse.org/request/show/778004
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=61
2020-02-21 15:33:18 +00:00
Vítězslav Čížek
97fb15d08d apply the sha3 patch
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=60
2020-02-19 08:57:54 +00:00
Vítězslav Čížek
ffdf279f1f Accepting request 776093 from home:jsikes:branches:security:tls
Finally submitted bsc#1155345. Enjoy!

OBS-URL: https://build.opensuse.org/request/show/776093
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=59
2020-02-19 08:42:05 +00:00
a7c4747f34 Accepting request 770495 from security:tls
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/770495
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=13
2020-02-11 21:16:32 +00:00
847afcdb2d Accepting request 768078 from security:tls
OBS-URL: https://build.opensuse.org/request/show/768078
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=12
2020-02-03 10:10:35 +00:00
048a7c3935 Accepting request 768532 from home:pmonrealgonzalez:branches:security:tls
- Support for CPACF enhancements - part 2 (crypto) [jsc#SLE-7403]

OBS-URL: https://build.opensuse.org/request/show/768532
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=56
2020-01-30 09:32:13 +00:00
Vítězslav Čížek
f10b8031f6 Accepting request 768077 from home:pmonrealgonzalez:branches:security:tls
- Support for CPACF enhancements - part 2 (crypto) [jsc#SLE-7575]
- Add patches:
  * openssl-s390x-assembly-pack-accelerate-X25519-X448-Ed25519-and-Ed448.patch
  * openssl-s390x-fix-x448-and-x448-test-vector-ctime-for-x25519-and-x448.patch

OBS-URL: https://build.opensuse.org/request/show/768077
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=55
2020-01-28 16:00:58 +00:00
Vítězslav Čížek
69c8efb60b Accepting request 767781 from home:pmonrealgonzalez:branches:security:tls
* openssl-1.1.1-ssh-kdf.patch replaces openssl-jsc-SLE-8789-backport_KDF.patch

OBS-URL: https://build.opensuse.org/request/show/767781
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=54
2020-01-27 14:29:03 +00:00
2a1b36e3f7 Accepting request 767728 from home:vitezslav_cizek:branches:security:tls
* openssl-1.1.1-ssh-kdf.patch replaces openssl-jsc-SLE-8789-backport_KDF.patch\
- keep EVP_KDF functions at version 1.1.1d for backward compatibility
  * add openssl-keep_EVP_KDF_functions_version.patch

OBS-URL: https://build.opensuse.org/request/show/767728
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=53
2020-01-27 14:25:49 +00:00
Tomáš Chvátal
d4b57dac41 Accepting request 766919 from home:vitezslav_cizek:branches:security:tls
layered FIPS initialization (bsc#1161789)

OBS-URL: https://build.opensuse.org/request/show/766919
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=52
2020-01-24 15:19:27 +00:00
Tomáš Chvátal
c29de1fbdc Accepting request 766865 from home:vitezslav_cizek:branches:security:tls
Add million FIPS and s390 patches

- Temporarily ignore broken OPENSSL_INIT_NO_ATEXIT due to our
  layered FIPS initialization
  * openssl-fips-ignore_broken_atexit_test.patch

- Import FIPS patches from SLE-15
  * openssl-fips-dont_run_FIPS_module_installed.patch
  * openssl-fips_mode.patch
  * openssl-ship_fips_standalone_hmac.patch
  * openssl-fips-clearerror.patch
  * openssl-fips-selftests_in_nonfips_mode.patch

- Don't run FIPS power-up self-tests when the checksum files aren't
  installed (bsc#1042392)
  * add openssl-fips-run_selftests_only_when_module_is_complete.patch

- Import FIPS patches from Fedora (bsc#1157702, jsc#SLE-9553)
  * openssl-1.1.1-fips-crng-test.patch
  * openssl-1.1.1-fips-post-rand.patch
  * openssl-1.1.1-fips.patch
  * openssl-1.1.0-issuer-hash.patch
  * openssl-1.1.1-evp-kdf.patch
  * openssl-1.1.1-ssh-kdf.patch replaces openssl-jsc-SLE-8789-backport_KDF.patch

- Support for CPACF enhancements - part 1 (crypto) [bsc#1152695, jsc#SLE-7861]
- Add patches:
  * openssl-s390x-assembly-pack-add-OPENSSL_s390xcap-environment.patch
  * openssl-s390x-assembly-pack-add-support-for-pcc-and-kma-inst.patch
  * openssl-s390x-assembly-pack-add-OPENSSL_s390xcap-man-page.patch
  * openssl-s390x-assembly-pack-update-OPENSSL_s390xcap-3.patch
  * openssl-s390xcpuid.pl-fix-comment.patch

OBS-URL: https://build.opensuse.org/request/show/766865
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=51
2020-01-24 11:52:58 +00:00
df3efa7271 Accepting request 761577 from security:tls
OBS-URL: https://build.opensuse.org/request/show/761577
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=11
2020-01-10 17:39:55 +00:00
Tomáš Chvátal
628c7ec234 Accepting request 761563 from home:vitezslav_cizek:branches:security:tls
- Obsolete libopenssl-1_0_0-devel in order to avoid conflict upon
  upgrade from SLE-12 (bsc#1158499)
- remove useless Suggests: libopenssl1_1-hmac, there's no such
  package anymore

OBS-URL: https://build.opensuse.org/request/show/761563
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=49
2020-01-07 12:23:32 +00:00
8047063f7d Accepting request 755725 from security:tls
OBS-URL: https://build.opensuse.org/request/show/755725
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=10
2019-12-23 21:36:03 +00:00
Tomáš Chvátal
2e0a10cc4c Accepting request 755640 from home:pmonrealgonzalez:branches:security:tls
- Security fix: [bsc#1158809, CVE-2019-1551]
  * Overflow bug in the x64_64 Montgomery squaring procedure used
    in exponentiation with 512-bit moduli
- Add openssl-1_1-CVE-2019-1551.patch

OBS-URL: https://build.opensuse.org/request/show/755640
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=47
2019-12-11 07:08:38 +00:00
9551f15083 Accepting request 738529 from security:tls
OBS-URL: https://build.opensuse.org/request/show/738529
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=9
2019-11-20 12:42:29 +00:00
Martin Pluskal
b1d4609f8b Accepting request 738478 from home:jsikes:branches:security:tls
fix for bug found by nodejs12 tests. Enjoy!

OBS-URL: https://build.opensuse.org/request/show/738478
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=45
2019-10-15 07:27:11 +00:00
Tomáš Chvátal
c8fd3bc915 Accepting request 738263 from home:adamm:node_test
- openssl-jsc-SLE-8789-backport_KDF.patch: retain old behaviour
  of EVP_PBE_scrypt. When key output buffer is not provided,
  only check if the input parameters are in valid range and
  ignore passphrase/salt fields as they are only used in
  the actual calculation.

OBS-URL: https://build.opensuse.org/request/show/738263
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=44
2019-10-14 11:29:05 +00:00
0d52304a01 Accepting request 730187 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1d (bsc#1133925, jsc#SLE-6430)
  * Fixed a fork protection issue. OpenSSL 1.1.1 introduced a rewritten random
    number generator (RNG). This was intended to include protection in the
    event of a fork() system call in order to ensure that the parent and child
    processes did not share the same RNG state. However this protection was not
    being used in the default case.
    (bsc#1150247, CVE-2019-1549)
  * Compute ECC cofactors if not provided during EC_GROUP construction. Before
    this change, EC_GROUP_set_generator would accept order and/or cofactor as
    NULL. After this change, only the cofactor parameter can be NULL.
    (bsc#1150003, CVE-2019-1547)
  * Fixed a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey.
    (bsc#1150250, CVE-2019-1563)
  * For built-in EC curves, ensure an EC_GROUP built from the curve name is
    used even when parsing explicit parameters, when loading a serialized key
    or calling EC_GROUP_new_from_ecpkparameters()/EC_GROUP_new_from_ecparameters().
  * Early start up entropy quality from the DEVRANDOM seed source has been
    improved for older Linux systems.
  * Changed DH_check to accept parameters with order q and 2q subgroups.
    With order 2q subgroups the bit 0 of the private key is not secret
    but DH_generate_key works around that by clearing bit 0 of the
    private key for those. This avoids leaking bit 0 of the private key.
  * Significantly reduce secure memory usage by the randomness pools.
  * Revert the DEVRANDOM_WAIT feature for Linux systems
- drop 0001-build_SYS_str_reasons-Fix-a-crash-caused-by-overlong.patch (upstream)
- refresh patches
  * openssl-1.1.0-no-html.patch
  * openssl-jsc-SLE-8789-backport_KDF.patch

OBS-URL: https://build.opensuse.org/request/show/730187
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=43
2019-09-11 15:31:50 +00:00
Tomáš Chvátal
231804ccdd Accepting request 729949 from home:jsikes:branches:security:tls
Finally finished jsc#SLE-8789. It's kinda big. Enjoy!

OBS-URL: https://build.opensuse.org/request/show/729949
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=42
2019-09-11 01:20:50 +00:00
bd961d7a0d Accepting request 709893 from security:tls
Resubmit working diff - no actual change compared to previous rev

OBS-URL: https://build.opensuse.org/request/show/709893
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=8
2019-06-18 12:51:37 +00:00
a42b43aa4d Merge the update into TW - the updtae won't happen quickly, as the maintainer submitted 1.1.1c
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=7
2019-06-14 06:34:53 +00:00
Vítězslav Čížek
79f711b66a Accepting request 708116 from home:vitezslav_cizek:branches:security:tls
- delete 0001-crypto-poly1305-asm-poly1305-s390x.pl-add-vx-code-pa.patch

OBS-URL: https://build.opensuse.org/request/show/708116
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=39
2019-06-06 11:24:07 +00:00
Tomáš Chvátal
949eaaafb4 Accepting request 708112 from home:vitezslav_cizek:branches:factory
- Use upstream patch for the locale crash (bsc#1135550)
- delete openssl-fix_underflow_in_errstr_handling.patch
- add 0001-build_SYS_str_reasons-Fix-a-crash-caused-by-overlong.patch

- Add s390x vectorized support for ChaCha20 and Poly1305
  (jsc#SLE-6126, jsc#SLE-6129)
  * 0001-s390x-assembly-pack-perlasm-support.patch
  * 0002-crypto-chacha-asm-chacha-s390x.pl-add-vx-code-path.patch
  * 0003-crypto-poly1305-asm-poly1305-s390x.pl-add-vx-code-pa.patch
  * 0004-s390x-assembly-pack-fix-formal-interface-bug-in-chac.patch
  * 0005-s390x-assembly-pack-import-chacha-from-cryptogams-re.patch
  * 0006-s390x-assembly-pack-import-poly-from-cryptogams-repo.patch
- Update to 1.1.1c (bsc#1133925, jsc#SLE-6430)
- drop upstreamed patches:
- update keyring by including Richard Levitte's key

OBS-URL: https://build.opensuse.org/request/show/708112
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=38
2019-06-06 11:11:21 +00:00
Tomáš Chvátal
0bd53d7b5f Accepting request 706506 from home:vitezslav_cizek:branches:o11
- Update openssl-fix_underflow_in_errstr_handling.patch to use
  upstream approved code
  * https://github.com/openssl/openssl/pull/8966
- update openssl.keyring to include Richard Levitte's key

- Update to 1.1.1c
  * Prevent over long nonces in ChaCha20-Poly1305 (CVE-2019-1543)
    ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input
    for every encryption operation. RFC 7539 specifies that the nonce value
    (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length
    and front pads the nonce with 0 bytes if it is less than 12
    bytes. However it also incorrectly allows a nonce to be set of up to 16
    bytes. In this case only the last 12 bytes are significant and any
    additional leading bytes are ignored.
  * Add build tests for C++.  These are generated files that only do one
    thing, to include one public OpenSSL head file each.  This tests that
    the public header files can be usefully included in a C++ application.
  * Enable SHA3 pre-hashing for ECDSA and DSA.
  * Change the default RSA, DSA and DH size to 2048 bit instead of 1024.
    This changes the size when using the genpkey app when no size is given. It
    fixes an omission in earlier changes that changed all RSA, DSA and DH
    generation apps to use 2048 bits by default.
  * Reorganize the manual pages to consistently have RETURN VALUES,
    EXAMPLES, SEE ALSO and HISTORY come in that order, and adjust
    util/fix-doc-nits accordingly.
  * Add the missing accessor EVP_PKEY_get0_engine()
  * Have apps like 's_client' and 's_server' output the signature scheme
    along with other cipher suite parameters when debugging.
  * Make OPENSSL_config() error agnostic again.
  * Do the error handling in RSA decryption constant time.

OBS-URL: https://build.opensuse.org/request/show/706506
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=37
2019-05-30 12:30:15 +00:00
Tomáš Chvátal
cc18b66076 Accepting request 705842 from home:jirislaby:branches:security:tls
fix typo during spec file merge

OBS-URL: https://build.opensuse.org/request/show/705842
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=36
2019-05-28 08:41:16 +00:00
Tomáš Chvátal
19ebb7106f Accepting request 705828 from home:jirislaby:branches:security:tls
- add 0001-Fix-for-BIO_get_mem_ptr-and-related-regressions.patch
  (bnc#1136522)

OBS-URL: https://build.opensuse.org/request/show/705828
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=35
2019-05-28 08:34:19 +00:00
562c04ef89 Accepting request 704541 from home:vitezslav_cizek:branches:security:tls
- Fix a crash caused by long locale messages (bsc#1135550)
  * add openssl-fix_underflow_in_errstr_handling.patch

OBS-URL: https://build.opensuse.org/request/show/704541
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=34
2019-05-21 22:05:39 +00:00
6fa52bddfa Accepting request 681494 from security:tls
OBS-URL: https://build.opensuse.org/request/show/681494
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=6
2019-05-16 19:54:39 +00:00
Tomáš Chvátal
9fbc063867 Accepting request 681475 from home:dimstar:Factory
Ed actually also seems not to be used; mangled into the previous changelog

OBS-URL: https://build.opensuse.org/request/show/681475
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=32
2019-03-04 15:24:35 +00:00
Tomáš Chvátal
085d59c21f Accepting request 681416 from home:dimstar:Factory
- Drop bc BuildRequires: I could not find any reference to this
  tool being used during build or check.

OBS-URL: https://build.opensuse.org/request/show/681416
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=31
2019-03-04 13:47:02 +00:00
Vítězslav Čížek
cdb3e58e2b Accepting request 680495 from home:vitezslav_cizek:branches:security:tls
- Use upstream-approved patch for the handling of strerror_r
  * https://github.com/openssl/openssl/pull/8371
- add openssl-fix-handling-of-GNU-strerror_r.patch
- drop strerror.patch

- Update to 1.1.1b
  * Added SCA hardening for modular field inversion in EC_GROUP
    through a new dedicated field_inv() pointer in EC_METHOD.
  * Change the info callback signals for the start and end of a post-handshake
    message exchange in TLSv1.3. In 1.1.1/1.1.1a we used SSL_CB_HANDSHAKE_START
    and SSL_CB_HANDSHAKE_DONE. Experience has shown that many applications get
    confused by this and assume that a TLSv1.2 renegotiation has started. This
    can break KeyUpdate handling. Instead we no longer signal the start and end
    of a post handshake message exchange (although the messages themselves are
    still signalled). This could break some applications that were expecting
    the old signals. However without this KeyUpdate is not usable for many
    applications.
  * Fix a bug in the computation of the endpoint-pair shared secret used
    by DTLS over SCTP. This breaks interoperability with older versions
    of OpenSSL like OpenSSL 1.1.0 and OpenSSL 1.0.2. There is a runtime
    switch SSL_MODE_DTLS_SCTP_LABEL_LENGTH_BUG (off by default) enabling
    interoperability with such broken implementations. However, enabling
    this switch breaks interoperability with correct implementations.
  * Fix a use after free bug in d2i_X509_PUBKEY when overwriting a
    re-used X509_PUBKEY object if the second PUBKEY is malformed.
  * Move strictness check from EVP_PKEY_asn1_new() to EVP_PKEY_asn1_add0()

OBS-URL: https://build.opensuse.org/request/show/680495
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=30
2019-03-01 13:44:38 +00:00
Tomáš Chvátal
1536180cd7 Accepting request 680106 from home:pmonrealgonzalez:branches:security:tls
OBS-URL: https://build.opensuse.org/request/show/680106
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=29
2019-02-28 14:22:49 +00:00
Tomáš Chvátal
20bf2c26d8 Accepting request 673390 from home:vitezslav_cizek:branches:security:tls
- Add s390x poly1305 vectorized implementation (fate#326351)
  * https://github.com/openssl/openssl/pull/7991
- add 0001-crypto-poly1305-asm-poly1305-s390x.pl-add-vx-code-pa.patch

OBS-URL: https://build.opensuse.org/request/show/673390
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=28
2019-02-11 15:56:50 +00:00
Vítězslav Čížek
7f68b5e229 Accepting request 667831 from home:vitezslav_cizek:branches:security:tls
- Add s390x chacha20 vectorized implementation (fate#326561)
  * https://github.com/openssl/openssl/pull/6919
- added patches:
  0001-s390x-assembly-pack-perlasm-support.patch
  0002-crypto-chacha-asm-chacha-s390x.pl-add-vx-code-path.patch

OBS-URL: https://build.opensuse.org/request/show/667831
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=27
2019-01-22 16:08:54 +00:00
Tomáš Chvátal
ea11949bb4 Accepting request 650515 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1a
  * Added EVP_PKEY_ECDH_KDF_X9_63 and ecdh_KDF_X9_63() as replacements for
    the EVP_PKEY_ECDH_KDF_X9_62 KDF type and ECDH_KDF_X9_62(). The old names
    are retained for backwards compatibility.
  * Fixed the issue that RAND_add()/RAND_seed() silently discards random input
    if its length exceeds 4096 bytes. The limit has been raised to a buffer size
    of two gigabytes and the error handling improved.
- drop upstream patches:
  * 0001-Add-a-constant-time-flag-to-one-of-the-bignums-to-av.patch
  * 0001-DSA-Check-for-sanity-of-input-parameters.patch
  * 0001-DSA-mod-inverse-fix.patch
  * openssl-CVE-2018-0734.patch
  * openssl-CVE-2018-0735.patch

OBS-URL: https://build.opensuse.org/request/show/650515
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=26
2018-11-20 14:58:17 +00:00
Vítězslav Čížek
c7efd6c62c Accepting request 646433 from home:vitezslav_cizek:branches:security:tls
drop accidentally added useless patch

OBS-URL: https://build.opensuse.org/request/show/646433
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=25
2018-11-05 14:46:47 +00:00
Vítězslav Čížek
c921472ddf Accepting request 646414 from home:vitezslav_cizek:branches:security:tls
- OpenSSL Security Advisory [30 October 2018]
  * Timing vulnerability in ECDSA signature generation
    (bsc#1113651, CVE-2018-0735)
  * Timing vulnerability in DSA signature generation
    (bsc#1113652, CVE-2018-0734)
  * And more timing fixes
- Add patches:
  * openssl-CVE-2018-0734.patch
  * openssl-CVE-2018-0735.patch
  * 0001-DSA-mod-inverse-fix.patch
  * 0001-Add-a-constant-time-flag-to-one-of-the-bignums-to-av.patch

- Fix infinite loop in DSA generation with incorrect parameters
  (bsc#1112209)
  * 0001-DSA-Check-for-sanity-of-input-parameters.patch

OBS-URL: https://build.opensuse.org/request/show/646414
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=24
2018-11-05 14:01:24 +00:00
Vítězslav Čížek
332d0e46eb Accepting request 644654 from home:elvigia:branches:security:tls
- Explictly select "getrandom" system call as the seed source,
  it is the safer/best performing choice on linux.
- do not force -std=gnu99, pick the compiler default.

OBS-URL: https://build.opensuse.org/request/show/644654
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=23
2018-10-25 13:55:29 +00:00
Vítězslav Čížek
a3426a21a5 Accepting request 635009 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1 release
  * This is the first official release of the OpenSSL 1.1.1 branch
    which brings TLS 1.3 support
- remove all TLS 1.3 ciphers from the DEFAULT_SUSE cipher list as they
  are configured differently
  * modified openssl-DEFAULT_SUSE_cipher.patch
- drop obsolete openssl-pretend_we_are_not_beta.patch

OBS-URL: https://build.opensuse.org/request/show/635009
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=22
2018-09-11 15:12:55 +00:00
Vítězslav Čížek
725b77cd89 Accepting request 631345 from home:vitezslav_cizek:branches:security:tls
drop zlib dependency

OBS-URL: https://build.opensuse.org/request/show/631345
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=21
2018-08-24 11:53:29 +00:00
Vítězslav Čížek
d71b6985eb Accepting request 631308 from home:vitezslav_cizek:branches:security:tls
* openssl-1.1.0-fips.patch
    * openssl-urandom-reseeding.patch

OBS-URL: https://build.opensuse.org/request/show/631308
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=20
2018-08-24 10:55:44 +00:00
Vítězslav Čížek
3e8cec6722 Accepting request 631304 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.1-pre9 (Beta 7)
  * Support for TLSv1.3 added
  * Move the display of configuration data to configdata.pm.
  * Allow GNU style "make variables" to be used with Configure.
  * Add a STORE module (OSSL_STORE)
  * Claim the namespaces OSSL and OPENSSL, represented as symbol prefixes
  * Add multi-prime RSA (RFC 8017) support
  * Add SM3 implemented according to GB/T 32905-2016
  * Add SM4 implemented according to GB/T 32907-2016.
  * Add 'Maximum Fragment Length' TLS extension negotiation and support
  * Add ARIA support
  * Add SHA3
  * Rewrite of devcrypto engine
  * Add support for SipHash
  * Grand redesign of the OpenSSL random generator
- pretend the release is not a Beta, to avoid "OpenSSL version mismatch"
  with OpenSSH
  * add openssl-pretend_we_are_not_beta.patch
- drop FIPS support
  * don't build with FIPS mode (not supported in 1.1.1)
  * don't create the -hmac subpackages
  - drop FIPS patches
    * openssl-fips-clearerror.patch
    * openssl-fips-dont-fall-back-to-default-digest.patch
    * openssl-fips-dont_run_FIPS_module_installed.patch
    * openssl-fips-fix-odd-rsakeybits.patch
    * openssl-fips-rsagen-d-bits.patch
    * openssl-fips-selftests_in_nonfips_mode.patch
    * openssl-fips_disallow_ENGINE_loading.patch
    * openssl-rsakeygen-minimum-distance.patch

OBS-URL: https://build.opensuse.org/request/show/631304
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=19
2018-08-24 10:39:49 +00:00
Vítězslav Čížek
2c20721036 add ;
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=18
2018-08-14 14:30:53 +00:00
Vítězslav Čížek
1434a42e91 - Update to 1.1.0i
OpenSSL Security Advisory [12 June 2018]
  * Reject excessively large primes in DH key generation
    (bsc#1097158, CVE-2018-0732)
  * Make EVP_PKEY_asn1_new() a bit stricter about its input
  * Revert blinding in ECDSA sign and instead make problematic addition
    length-invariant. Switch even to fixed-length Montgomery multiplication.
  * Change generating and checking of primes so that the error rate of not
    being prime depends on the intended use based on the size of the input.
  * Increase the number of Miller-Rabin rounds for DSA key generating to 64.
  * Add blinding to ECDSA and DSA signatures to protect against side channel
    attacks
  * When unlocking a pass phrase protected PEM file or PKCS#8 container, we
    now allow empty (zero character) pass phrases.
  * Certificate time validation (X509_cmp_time) enforces stricter
    compliance with RFC 5280. Fractional seconds and timezone offsets
    are no longer allowed.
  * Fixed a text canonicalisation bug in CMS
- drop patches (upstream):
  * 0001-Limit-scope-of-CN-name-constraints.patch
  * 0001-Revert-util-dofile.pl-only-quote-stuff-that-actually.patch
  * 0001-Tolerate-a-Certificate-using-a-non-supported-group-o.patch
  * 0002-Skip-CN-DNS-name-constraint-checks-when-not-needed.patch
- refresh patches:
  * openssl-1.1.0-fips.patch
  * openssl-disable_rsa_keygen_tests_with_small_modulus.patch
- rename openssl-CVE-2018-0737.patch to openssl-CVE-2018-0737-fips.patch
  as it now only includes changes to the fips code

OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=17
2018-08-14 14:11:16 +00:00
97b1fb8284 Accepting request 627061 from security:tls
OBS-URL: https://build.opensuse.org/request/show/627061
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=5
2018-08-07 07:40:53 +00:00
Tomáš Chvátal
fff0b397cb Accepting request 627059 from home:vitezslav_cizek:branches:security:tls
- Add openssl(cli) Provide so the packages that require the openssl
  binary can require this instead of the new openssl meta package
  (bsc#1101470)
- Don't Require openssl-1_1 from the devel package, just Recommend it

OBS-URL: https://build.opensuse.org/request/show/627059
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=15
2018-08-02 11:19:07 +00:00
e46d77e829 Accepting request 613477 from security:tls
OBS-URL: https://build.opensuse.org/request/show/613477
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=4
2018-06-03 10:32:23 +00:00
Tomáš Chvátal
ae6dfc8494 Accepting request 613454 from home:vitezslav_cizek:branches:security:tls
- Suggest libopenssl1_1-hmac from libopenssl1_1 package to avoid
  dependency issues during updates (bsc#1090765)

OBS-URL: https://build.opensuse.org/request/show/613454
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=13
2018-06-01 13:28:44 +00:00
Tomáš Chvátal
20fb199cba Accepting request 612812 from home:vitezslav_cizek:branches:security:tls
- Relax CN name restrictions (bsc#1084011)
  * added patches:
    0001-Limit-scope-of-CN-name-constraints.patch
    0002-Skip-CN-DNS-name-constraint-checks-when-not-needed.patch

OBS-URL: https://build.opensuse.org/request/show/612812
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=12
2018-05-29 09:17:53 +00:00
a3c768a628 Accepting request 606163 from security:tls
OBS-URL: https://build.opensuse.org/request/show/606163
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=3
2018-05-13 13:56:45 +00:00
Tomáš Chvátal
1d99f4ef85 Accepting request 606162 from home:vitezslav_cizek:branches:security:tls
- OpenSSL Security Advisory [16 Apr 2018]
  * Cache timing vulnerability in RSA Key Generation
    (CVE-2018-0737, bsc#1089039)
  * add openssl-CVE-2018-0737.patch

- Fix escaping in c_rehash (boo#1091961, bsc#1091963)
  * add 0001-Revert-util-dofile.pl-only-quote-stuff-that-actually.patch

OBS-URL: https://build.opensuse.org/request/show/606162
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=10
2018-05-10 13:45:22 +00:00
e4b2aa53c5 Accepting request 592073 from security:tls
OBS-URL: https://build.opensuse.org/request/show/592073
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=2
2018-03-30 10:01:42 +00:00
Vítězslav Čížek
54892abfae Accepting request 592071 from home:vitezslav_cizek:branches:security:tls
- Tolerate a Certificate using a non-supported group on server side
  (boo#1084651)
  * https://github.com/openssl/openssl/pull/5607
  * add 0001-Tolerate-a-Certificate-using-a-non-supported-group-o.patch

OBS-URL: https://build.opensuse.org/request/show/592071
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=8
2018-03-28 14:56:27 +00:00
Tomáš Chvátal
d99d49a007 Accepting request 591684 from home:vitezslav_cizek:branches:security:tls
- Update to 1.1.0h
  OpenSSL Security Advisory [27 Mar 2018]
  * Constructed ASN.1 types with a recursive definition could exceed
    the stack (CVE-2018-0739) (bsc#1087102)
  * rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)
    (bsc#1071906)
- refresh patches:
  * 0001-Axe-builtin-printf-implementation-use-glibc-instead.patch
  * openssl-1.1.0-fips.patch
  * openssl-pkgconfig.patch
  * openssl-rsakeygen-minimum-distance.patch
  * openssl-static-deps.patch

OBS-URL: https://build.opensuse.org/request/show/591684
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=7
2018-03-27 15:20:21 +00:00
861086e436 Accepting request 580922 from security:tls
If I already fix stuff, it really would be cool to get the stuff forwarded, so the fix is also used

OBS-URL: https://build.opensuse.org/request/show/580922
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=1
2018-03-01 11:05:23 +00:00
Tomáš Chvátal
062f581322 Accepting request 580786 from home:dimstar:Factory
- Move the libopenssl1_1_0-32bit obsoletes in baselibs.conf to the
  new libopenssl1_1-32bit: it does not belong to the devel
  package.

OBS-URL: https://build.opensuse.org/request/show/580786
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=5
2018-02-27 20:50:55 +00:00
Vítězslav Čížek
e248990eb1 Accepting request 578316 from home:vitezslav_cizek:branches:security:tls
* obsolete the 1_1_0 packages

OBS-URL: https://build.opensuse.org/request/show/578316
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=4
2018-02-20 11:18:48 +00:00
Vítězslav Čížek
c1b8e5cee5 - update baselibs.conf with the new version names
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=3
2018-02-16 12:58:14 +00:00
Vítězslav Čížek
02427a3414 - Renamed from openssl-1_1_0 (bsc#1081335)
* All the minor versions of the 1.1.x openssl branch have the same
    sonum and keep ABI compatibility

- Remove bit obsolete syntax
- Use %license macro

- Don't disable afalgeng on aarch64

- Add support for s390x CPACF enhancements (fate#321518)
  patches taken from https://github.com/openssl/openssl/pull/2859:
  * 0002-crypto-modes-asm-ghash-s390x.pl-fix-gcm_gmult_4bit-K.patch
  * 0004-s390x-assembly-pack-add-OPENSSL_s390xcap-environment.patch
  * 0005-s390x-assembly-pack-add-OPENSSL_s390xcap-man-page.patch
  * 0006-s390x-assembly-pack-extended-s390x-capability-vector.patch
  * 0007-crypto-evp-e_aes.c-add-foundations-for-extended-s390.patch
  * 0008-s390x-assembly-pack-extended-s390x-capability-vector.patch
  * 0009-crypto-aes-asm-aes-s390x.pl-add-KMA-code-path.patch
  * 0010-doc-man3-OPENSSL_s390xcap.pod-update-KMA.patch
  * 0011-crypto-aes-asm-aes-s390x.pl-add-CFI-annotations-KMA-.patch
  * 0012-s390x-assembly-pack-add-KMA-code-path-for-aes-gcm.patch
  * 0013-crypto-aes-asm-aes-s390x.pl-add-CFI-annotations-KMA-.patch

- Do not filter pkgconfig() provides/requires.

- Obsolete openssl-1_0_0 by openssl-1_1_0: this is required for a
  clean upgrade path as an aid to zypp (boo#1070003).

- Update to 1.1.0g
  OpenSSL Security Advisory [02 Nov 2017]

OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=2
2018-02-16 12:13:08 +00:00

Diff Content Not Available