SHA256
1
0
forked from pool/openssl-1_1
Go to file
Dominique Leuenberger 4377a5e5ee Accepting request 1063743 from security:tls
- Update to 1.1.1t:
  * Fixed X.400 address type confusion in X.509 GeneralName.
    There is a type confusion vulnerability relating to X.400 address processing
    inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING
    but subsequently interpreted by GENERAL_NAME_cmp as an ASN1_TYPE. This
    vulnerability may allow an attacker who can provide a certificate chain and
    CRL (neither of which need have a valid signature) to pass arbitrary
    pointers to a memcmp call, creating a possible read primitive, subject to
    some constraints. Refer to the advisory for more information. Thanks to
    David Benjamin for discovering this issue. [bsc#1207533, CVE-2023-0286]
    This issue has been fixed by changing the public header file definition of
    GENERAL_NAME so that x400Address reflects the implementation. It was not
    possible for any existing application to successfully use the existing
    definition; however, if any application references the x400Address field
    (e.g. in dead code), note that the type of this field has changed. There is
    no ABI change.
  * Fixed Use-after-free following BIO_new_NDEF.
    The public API function BIO_new_NDEF is a helper function used for
    streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL
    to support the SMIME, CMS and PKCS7 streaming capabilities, but may also
    be called directly by end user applications.
    The function receives a BIO from the caller, prepends a new BIO_f_asn1
    filter BIO onto the front of it to form a BIO chain, and then returns
    the new head of the BIO chain to the caller. Under certain conditions,
    for example if a CMS recipient public key is invalid, the new filter BIO
    is freed and the function returns a NULL result indicating a failure.
    However, in this case, the BIO chain is not properly cleaned up and the
    BIO passed by the caller still retains internal pointers to the previously
    freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO
    then a use-after-free will occur. This will most likely result in a crash.

OBS-URL: https://build.opensuse.org/request/show/1063743
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-1_1?expand=0&rev=42
2023-02-14 15:44:47 +00:00
.gitattributes - Renamed from openssl-1_1_0 (bsc#1081335) 2018-02-16 12:13:08 +00:00
.gitignore - Renamed from openssl-1_1_0 (bsc#1081335) 2018-02-16 12:13:08 +00:00
0001-s390x-assembly-pack-perlasm-support.patch Accepting request 708112 from home:vitezslav_cizek:branches:factory 2019-06-06 11:11:21 +00:00
0002-crypto-chacha-asm-chacha-s390x.pl-add-vx-code-path.patch Accepting request 786956 from home:vitezslav_cizek:branches:security:tls 2020-03-20 17:43:35 +00:00
0003-crypto-poly1305-asm-poly1305-s390x.pl-add-vx-code-pa.patch Accepting request 786956 from home:vitezslav_cizek:branches:security:tls 2020-03-20 17:43:35 +00:00
0004-s390x-assembly-pack-fix-formal-interface-bug-in-chac.patch Accepting request 708112 from home:vitezslav_cizek:branches:factory 2019-06-06 11:11:21 +00:00
0005-s390x-assembly-pack-import-chacha-from-cryptogams-re.patch Accepting request 708112 from home:vitezslav_cizek:branches:factory 2019-06-06 11:11:21 +00:00
0006-s390x-assembly-pack-import-poly-from-cryptogams-repo.patch Accepting request 708112 from home:vitezslav_cizek:branches:factory 2019-06-06 11:11:21 +00:00
baselibs.conf Accepting request 1062217 from security:tls:unstable 2023-01-31 12:15:21 +00:00
openssl-1_1-AES-GCM-performance-optimzation-with-stitched-method.patch Accepting request 1042846 from home:ohollmann:branches:security:tls 2022-12-14 09:46:30 +00:00
openssl-1_1-chacha20-performance-optimizations-for-ppc64le-with-.patch Accepting request 1042846 from home:ohollmann:branches:security:tls 2022-12-14 09:46:30 +00:00
openssl-1_1-disable-test_srp-sslapi.patch Accepting request 865443 from home:pmonrealgonzalez:branches:security:tls 2021-01-21 14:53:39 +00:00
openssl-1_1-FIPS-fix-error-reason-codes.patch Accepting request 954189 from home:pmonrealgonzalez:branches:security:tls 2022-02-14 12:37:47 +00:00
openssl-1_1-Fix-AES-GCM-on-Power-8-CPUs.patch Accepting request 1042984 from home:ohollmann:branches:security:tls 2022-12-14 20:20:45 +00:00
openssl-1_1-Fixed-conditional-statement-testing-64-and-256-bytes.patch Accepting request 1042846 from home:ohollmann:branches:security:tls 2022-12-14 09:46:30 +00:00
openssl-1_1-Fixed-counter-overflow.patch Accepting request 1042846 from home:ohollmann:branches:security:tls 2022-12-14 09:46:30 +00:00
openssl-1_1-openssl-config.patch Accepting request 1063668 from home:ohollmann:branches:security:tls 2023-02-08 08:03:11 +00:00
openssl-1_1-Optimize-AES-GCM-uarchs.patch Accepting request 949750 from home:pmonrealgonzalez:branches:security:tls 2022-01-28 17:51:43 +00:00
openssl-1_1-Optimize-AES-XTS-aarch64.patch Accepting request 949750 from home:pmonrealgonzalez:branches:security:tls 2022-01-28 17:51:43 +00:00
openssl-1_1-Optimize-ppc64.patch Accepting request 949750 from home:pmonrealgonzalez:branches:security:tls 2022-01-28 17:51:43 +00:00
openssl-1_1-Optimize-RSA-armv8.patch Accepting request 949750 from home:pmonrealgonzalez:branches:security:tls 2022-01-28 17:51:43 +00:00
openssl-1_1-paramgen-default_to_rfc7919.patch Accepting request 1007029 from home:ohollmann:branches:home:jsikes:branches:security:tls 2022-09-30 10:26:12 +00:00
openssl-1_1-seclevel.patch Accepting request 865443 from home:pmonrealgonzalez:branches:security:tls 2021-01-21 14:53:39 +00:00
openssl-1_1-use-include-directive.patch Accepting request 960455 from home:pmonrealgonzalez:branches:security:tls 2022-03-09 11:25:28 +00:00
openssl-1_1-use-seclevel2-in-tests.patch Accepting request 865443 from home:pmonrealgonzalez:branches:security:tls 2021-01-21 14:53:39 +00:00
openssl-1_1.changes Accepting request 1063668 from home:ohollmann:branches:security:tls 2023-02-08 08:03:11 +00:00
openssl-1_1.spec Accepting request 1063668 from home:ohollmann:branches:security:tls 2023-02-08 08:03:11 +00:00
openssl-1.1.0-issuer-hash.patch Accepting request 873674 from home:pmonrealgonzalez:branches:security:tls 2021-02-22 12:20:01 +00:00
openssl-1.1.0-no-html.patch Accepting request 790182 from home:vitezslav_cizek:branches:security:tls 2020-03-31 14:27:13 +00:00
openssl-1.1.1-evp-kdf.patch Accepting request 961990 from home:pmonrealgonzalez:branches:security:tls 2022-03-15 18:24:32 +00:00
openssl-1.1.1-fips-crng-test.patch Accepting request 796077 from home:vitezslav_cizek:branches:security:tls 2020-04-21 15:13:15 +00:00
openssl-1.1.1-fips-post-rand.patch Accepting request 854071 from home:vitezslav_cizek:branches:security:tls 2020-12-14 11:20:34 +00:00
openssl-1.1.1-fips.patch Accepting request 961990 from home:pmonrealgonzalez:branches:security:tls 2022-03-15 18:24:32 +00:00
openssl-1.1.1-ssh-kdf.patch Accepting request 786956 from home:vitezslav_cizek:branches:security:tls 2020-03-20 17:43:35 +00:00
openssl-1.1.1-system-cipherlist.patch Accepting request 942952 from home:pmonrealgonzalez:branches:security:tls 2022-01-03 08:42:13 +00:00
openssl-1.1.1t.tar.gz Accepting request 1063668 from home:ohollmann:branches:security:tls 2023-02-08 08:03:11 +00:00
openssl-1.1.1t.tar.gz.asc Accepting request 1063668 from home:ohollmann:branches:security:tls 2023-02-08 08:03:11 +00:00
openssl-add_rfc3526_rfc7919.patch Accepting request 895194 from home:jsikes:branches:security:tls 2021-05-24 15:50:42 +00:00
openssl-assembly-pack-accelerate-scalar-multiplication.patch Accepting request 786956 from home:vitezslav_cizek:branches:security:tls 2020-03-20 17:43:35 +00:00
openssl-DEFAULT_SUSE_cipher.patch Accepting request 960455 from home:pmonrealgonzalez:branches:security:tls 2022-03-09 11:25:28 +00:00
openssl-Enable-curve-spefific-ECDSA-implementations-via-EC_M.patch Accepting request 786956 from home:vitezslav_cizek:branches:security:tls 2020-03-20 17:43:35 +00:00
openssl-fips_fix_selftests_return_value.patch Accepting request 778004 from home:vitezslav_cizek:branches:security:tls 2020-02-21 15:33:18 +00:00
openssl-fips_mode.patch Accepting request 766865 from home:vitezslav_cizek:branches:security:tls 2020-01-24 11:52:58 +00:00
openssl-fips_selftest_upstream_drbg.patch Accepting request 836174 from home:vitezslav_cizek:branches:security:tls 2020-09-23 06:41:06 +00:00
openssl-fips-add-SHA3-selftest.patch Accepting request 776093 from home:jsikes:branches:security:tls 2020-02-19 08:42:05 +00:00
openssl-fips-clearerror.patch Accepting request 766865 from home:vitezslav_cizek:branches:security:tls 2020-01-24 11:52:58 +00:00
openssl-fips-dont_run_FIPS_module_installed.patch Accepting request 766865 from home:vitezslav_cizek:branches:security:tls 2020-01-24 11:52:58 +00:00
openssl-fips-ignore_broken_atexit_test.patch Accepting request 766865 from home:vitezslav_cizek:branches:security:tls 2020-01-24 11:52:58 +00:00
openssl-fips-run_selftests_only_when_module_is_complete.patch Accepting request 766865 from home:vitezslav_cizek:branches:security:tls 2020-01-24 11:52:58 +00:00
openssl-fips-selftests_in_nonfips_mode.patch Accepting request 766865 from home:vitezslav_cizek:branches:security:tls 2020-01-24 11:52:58 +00:00
openssl-Fix-9bf682f-which-broke-nistp224_method.patch Accepting request 766865 from home:vitezslav_cizek:branches:security:tls 2020-01-24 11:52:58 +00:00
openssl-keep_EVP_KDF_functions_version.patch Accepting request 767728 from home:vitezslav_cizek:branches:security:tls 2020-01-27 14:25:49 +00:00
openssl-OPENSSL_s390xcap.pod-list-msa9-facility-bit-155.patch Accepting request 766865 from home:vitezslav_cizek:branches:security:tls 2020-01-24 11:52:58 +00:00
openssl-pkgconfig.patch Accepting request 631304 from home:vitezslav_cizek:branches:security:tls 2018-08-24 10:39:49 +00:00
openssl-ppc64-config.patch Accepting request 631304 from home:vitezslav_cizek:branches:security:tls 2018-08-24 10:39:49 +00:00
openssl-riscv64-config.patch Accepting request 985766 from home:Andreas_Schwab:Factory 2022-07-07 02:47:54 +00:00
openssl-s390x-assembly-pack-accelerate-ECDSA.patch Accepting request 786956 from home:vitezslav_cizek:branches:security:tls 2020-03-20 17:43:35 +00:00
openssl-s390x-assembly-pack-accelerate-X25519-X448-Ed25519-and-Ed448.patch Accepting request 786956 from home:vitezslav_cizek:branches:security:tls 2020-03-20 17:43:35 +00:00
openssl-s390x-assembly-pack-add-OPENSSL_s390xcap-environment.patch Accepting request 980599 from home:jsikes:branches:security:tls 2022-06-07 06:28:40 +00:00
openssl-s390x-assembly-pack-add-OPENSSL_s390xcap-man-page.patch Accepting request 766865 from home:vitezslav_cizek:branches:security:tls 2020-01-24 11:52:58 +00:00
openssl-s390x-assembly-pack-add-support-for-pcc-and-kma-inst.patch Accepting request 980599 from home:jsikes:branches:security:tls 2022-06-07 06:28:40 +00:00
openssl-s390x-assembly-pack-cleanse-only-sensitive-fields.patch Accepting request 766865 from home:vitezslav_cizek:branches:security:tls 2020-01-24 11:52:58 +00:00
openssl-s390x-assembly-pack-fix-msa3-stfle-bit-detection.patch Accepting request 766865 from home:vitezslav_cizek:branches:security:tls 2020-01-24 11:52:58 +00:00
openssl-s390x-assembly-pack-fix-OPENSSL_s390xcap-z15-cpu-mas.patch Accepting request 766865 from home:vitezslav_cizek:branches:security:tls 2020-01-24 11:52:58 +00:00
openssl-s390x-assembly-pack-update-OPENSSL_s390xcap-3.patch Accepting request 766865 from home:vitezslav_cizek:branches:security:tls 2020-01-24 11:52:58 +00:00
openssl-s390x-fix-x448-and-x448-test-vector-ctime-for-x25519-and-x448.patch Accepting request 786956 from home:vitezslav_cizek:branches:security:tls 2020-03-20 17:43:35 +00:00
openssl-s390xcpuid.pl-fix-comment.patch Accepting request 766865 from home:vitezslav_cizek:branches:security:tls 2020-01-24 11:52:58 +00:00
openssl-ship_fips_standalone_hmac.patch Accepting request 766865 from home:vitezslav_cizek:branches:security:tls 2020-01-24 11:52:58 +00:00
openssl-truststore.patch Accepting request 631304 from home:vitezslav_cizek:branches:security:tls 2018-08-24 10:39:49 +00:00
openssl-unknown_dgst.patch Accepting request 786956 from home:vitezslav_cizek:branches:security:tls 2020-03-20 17:43:35 +00:00
openssl.keyring Accepting request 1063668 from home:ohollmann:branches:security:tls 2023-02-08 08:03:11 +00:00
showciphers.c - Renamed from openssl-1_1_0 (bsc#1081335) 2018-02-16 12:13:08 +00:00