3
0
forked from pool/openssl-3
Go to file
Pedro Monreal Gonzalez c7c7fd87d3 Accepting request 1032747 from home:ohollmann:branches:security:tls
- Temporary disable tests test_ssl_new and test_sslapi because they are
  failing in openSUSE_Tumbleweed

- Update to 3.0.7: [bsc#1204714, CVE-2022-3602,CVE-2022-3786]
  * Fixed two buffer overflows in punycode decoding functions.
    A buffer overrun can be triggered in X.509 certificate verification,
    specifically in name constraint checking. Note that this occurs after
    certificate chain signature verification and requires either a CA to
    have signed the malicious certificate or for the application to continue
    certificate verification despite failure to construct a path to a trusted
    issuer.
    In a TLS client, this can be triggered by connecting to a malicious
    server.  In a TLS server, this can be triggered if the server requests
    client authentication and a malicious client connects.
    An attacker can craft a malicious email address to overflow
    an arbitrary number of bytes containing the `.`  character (decimal 46)
    on the stack.  This buffer overflow could result in a crash (causing a
    denial of service).
    ([CVE-2022-3786])
    An attacker can craft a malicious email address to overflow four
    attacker-controlled bytes on the stack.  This buffer overflow could
    result in a crash (causing a denial of service) or potentially remote code
    execution depending on stack layout for any given platform/compiler.
    ([CVE-2022-3602])
  * Removed all references to invalid OSSL_PKEY_PARAM_RSA names for CRT
    parameters in OpenSSL code.
    Applications should not use the names OSSL_PKEY_PARAM_RSA_FACTOR,
    OSSL_PKEY_PARAM_RSA_EXPONENT and OSSL_PKEY_PARAM_RSA_COEFFICIENT.
    Use the numbered names such as OSSL_PKEY_PARAM_RSA_FACTOR1 instead.
    Using these invalid names may cause algorithms to use slower methods

OBS-URL: https://build.opensuse.org/request/show/1032747
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=47
2022-11-01 20:31:17 +00:00
.gitattributes Accepting request 796816 from home:vitezslav_cizek 2020-04-24 08:03:40 +00:00
.gitignore Accepting request 796816 from home:vitezslav_cizek 2020-04-24 08:03:40 +00:00
baselibs.conf Accepting request 1003620 from home:dziobian 2022-09-15 18:24:37 +00:00
fix-config-in-tests.patch Accepting request 949760 from security:tls:unstable 2022-01-28 19:30:29 +00:00
openssl-1.1.0-no-html.patch Accepting request 796816 from home:vitezslav_cizek 2020-04-24 08:03:40 +00:00
openssl-3.0.7.tar.gz Accepting request 1032747 from home:ohollmann:branches:security:tls 2022-11-01 20:31:17 +00:00
openssl-3.0.7.tar.gz.asc Accepting request 1032747 from home:ohollmann:branches:security:tls 2022-11-01 20:31:17 +00:00
openssl-3.changes Accepting request 1032747 from home:ohollmann:branches:security:tls 2022-11-01 20:31:17 +00:00
openssl-3.spec Accepting request 1032747 from home:ohollmann:branches:security:tls 2022-11-01 20:31:17 +00:00
openssl-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch Accepting request 990534 from security:tls:unstable 2022-07-21 11:29:20 +00:00
openssl-DEFAULT_SUSE_cipher.patch Accepting request 841985 from home:pmonrealgonzalez:branches:security:tls 2020-10-15 19:22:03 +00:00
openssl-no-date.patch Accepting request 796816 from home:vitezslav_cizek 2020-04-24 08:03:40 +00:00
openssl-Override-default-paths-for-the-CA-directory-tree.patch Accepting request 962003 from home:pmonrealgonzalez:branches:security:tls 2022-03-15 19:28:22 +00:00
openssl-pkgconfig.patch Accepting request 796816 from home:vitezslav_cizek 2020-04-24 08:03:40 +00:00
openssl-ppc64-config.patch Accepting request 821489 from home:pmonrealgonzalez:branches:security:tls 2020-07-17 11:26:23 +00:00
openssl-truststore.patch Accepting request 796816 from home:vitezslav_cizek 2020-04-24 08:03:40 +00:00
openssl-use-versioned-config.patch Accepting request 962003 from home:pmonrealgonzalez:branches:security:tls 2022-03-15 19:28:22 +00:00
openssl.keyring Accepting request 1032747 from home:ohollmann:branches:security:tls 2022-11-01 20:31:17 +00:00
showciphers.c Accepting request 796816 from home:vitezslav_cizek 2020-04-24 08:03:40 +00:00