3
0
forked from pool/openssl-3
Go to file
Martin Pluskal 0620c0c33d Accepting request 1063662 from home:ohollmann:branches:security:tls
- Update to 3.0.8:
  * Fixed NULL dereference during PKCS7 data verification.
    A NULL pointer can be dereferenced when signatures are being
    verified on PKCS7 signed or signedAndEnveloped data. In case the hash
    algorithm used for the signature is known to the OpenSSL library but
    the implementation of the hash algorithm is not available the digest
    initialization will fail. There is a missing check for the return
    value from the initialization function which later leads to invalid
    usage of the digest API most likely leading to a crash.
    ([bsc#1207541, CVE-2023-0401])
    PKCS7 data is processed by the SMIME library calls and also by the
    time stamp (TS) library calls. The TLS implementation in OpenSSL does
    not call these functions however third party applications would be
    affected if they call these functions to verify signatures on untrusted
    data.
  * Fixed X.400 address type confusion in X.509 GeneralName.
    There is a type confusion vulnerability relating to X.400 address processing
    inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING
    but the public structure definition for GENERAL_NAME incorrectly specified
    the type of the x400Address field as ASN1_TYPE. This field is subsequently
    interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather
    than an ASN1_STRING.
    When CRL checking is enabled (i.e. the application sets the
    X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to
    pass arbitrary pointers to a memcmp call, enabling them to read memory
    contents or enact a denial of service.
    ([bsc#1207533, CVE-2023-0286])
  * Fixed NULL dereference validating DSA public key.
    An invalid pointer dereference on read can be triggered when an
    application tries to check a malformed DSA public key by the

OBS-URL: https://build.opensuse.org/request/show/1063662
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=53
2023-02-08 08:07:42 +00:00
.gitattributes Accepting request 796816 from home:vitezslav_cizek 2020-04-24 08:03:40 +00:00
.gitignore Accepting request 796816 from home:vitezslav_cizek 2020-04-24 08:03:40 +00:00
baselibs.conf Accepting request 1062222 from security:tls:unstable 2023-01-31 12:15:10 +00:00
openssl-3.0.8.tar.gz Accepting request 1063662 from home:ohollmann:branches:security:tls 2023-02-08 08:07:42 +00:00
openssl-3.0.8.tar.gz.asc Accepting request 1063662 from home:ohollmann:branches:security:tls 2023-02-08 08:07:42 +00:00
openssl-3.changes Accepting request 1063662 from home:ohollmann:branches:security:tls 2023-02-08 08:07:42 +00:00
openssl-3.spec Accepting request 1063662 from home:ohollmann:branches:security:tls 2023-02-08 08:07:42 +00:00
openssl-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch Accepting request 1063662 from home:ohollmann:branches:security:tls 2023-02-08 08:07:42 +00:00
openssl-DEFAULT_SUSE_cipher.patch Accepting request 841985 from home:pmonrealgonzalez:branches:security:tls 2020-10-15 19:22:03 +00:00
openssl-no-date.patch Accepting request 796816 from home:vitezslav_cizek 2020-04-24 08:03:40 +00:00
openssl-no-html-docs.patch Accepting request 1062222 from security:tls:unstable 2023-01-31 12:15:10 +00:00
openssl-Override-default-paths-for-the-CA-directory-tree.patch Accepting request 962003 from home:pmonrealgonzalez:branches:security:tls 2022-03-15 19:28:22 +00:00
openssl-pkgconfig.patch Accepting request 796816 from home:vitezslav_cizek 2020-04-24 08:03:40 +00:00
openssl-ppc64-config.patch Accepting request 821489 from home:pmonrealgonzalez:branches:security:tls 2020-07-17 11:26:23 +00:00
openssl-truststore.patch Accepting request 796816 from home:vitezslav_cizek 2020-04-24 08:03:40 +00:00
openssl.keyring Accepting request 1063662 from home:ohollmann:branches:security:tls 2023-02-08 08:07:42 +00:00
showciphers.c Accepting request 796816 from home:vitezslav_cizek 2020-04-24 08:03:40 +00:00