forked from pool/openssl
fa61203f41
- OpenSSL Security Advisory [3rd May 2016] - update to 1.0.2h (boo#977584, boo#977663) * Prevent padding oracle in AES-NI CBC MAC check A MITM attacker can use a padding oracle attack to decrypt traffic when the connection uses an AES CBC cipher and the server support AES-NI. (CVE-2016-2107, boo#977616) * Fix EVP_EncodeUpdate overflow An overflow can occur in the EVP_EncodeUpdate() function which is used for Base64 encoding of binary data. If an attacker is able to supply very large amounts of input data then a length check can overflow resulting in a heap corruption. (CVE-2016-2105, boo#977614) * Fix EVP_EncryptUpdate overflow An overflow can occur in the EVP_EncryptUpdate() function. If an attacker is able to supply very large amounts of input data after a previous call to EVP_EncryptUpdate() with a partial block then a length check can overflow resulting in a heap corruption. (CVE-2016-2106, boo#977615) * Prevent ASN.1 BIO excessive memory allocation When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio() a short invalid encoding can casuse allocation of large amounts of memory potentially consuming excessive resources or exhausting memory. (CVE-2016-2109, boo#976942) * EBCDIC overread ASN1 Strings that are over 1024 bytes can cause an overread in applications using the X509_NAME_oneline() function on EBCDIC systems. This could result in arbitrary stack data being returned in the buffer. (CVE-2016-2176, boo#978224) * Modify behavior of ALPN to invoke callback after SNI/servername (forwarded request 393446 from vitezslav_cizek) OBS-URL: https://build.opensuse.org/request/show/393456 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=132 |
||
---|---|---|
.gitattributes | ||
.gitignore | ||
0001-Axe-builtin-printf-implementation-use-glibc-instead.patch | ||
0001-libcrypto-Hide-library-private-symbols.patch | ||
0005-libssl-Hide-library-private-symbols.patch | ||
baselibs.conf | ||
bug610223.patch | ||
compression_methods_switch.patch | ||
merge_from_0.9.8k.patch | ||
openssl-1.0.0-c_rehash-compat.diff | ||
openssl-1.0.1e-add-suse-default-cipher.patch | ||
openssl-1.0.1e-add-test-suse-default-cipher-suite.patch | ||
openssl-1.0.1e-truststore.diff | ||
openssl-1.0.2a-default-paths.patch | ||
openssl-1.0.2a-fips-ctor.patch | ||
openssl-1.0.2a-fips-ec.patch | ||
openssl-1.0.2a-ipv6-apps.patch | ||
openssl-1.0.2a-new-fips-reqs.patch | ||
openssl-1.0.2a-padlock64.patch | ||
openssl-1.0.2e-fips.patch | ||
openssl-1.0.2h.tar.gz | ||
openssl-1.0.2h.tar.gz.asc | ||
openssl-fips_disallow_ENGINE_loading.patch | ||
openssl-fips_disallow_x931_rand_method.patch | ||
openssl-fips_RSA_compute_d_with_lcm.patch | ||
openssl-fips-clearerror.patch | ||
openssl-fips-dont-fall-back-to-default-digest.patch | ||
openssl-fips-fix-odd-rsakeybits.patch | ||
openssl-fips-hidden.patch | ||
openssl-fips-rsagen-d-bits.patch | ||
openssl-fips-selftests_in_nonfips_mode.patch | ||
openssl-fix-pod-syntax.diff | ||
openssl-gcc-attributes.patch | ||
openssl-missing_FIPS_ec_group_new_by_curve_name.patch | ||
openssl-no-egd.patch | ||
openssl-ocloexec.patch | ||
openssl-pkgconfig.patch | ||
openssl-rsakeygen-minimum-distance.patch | ||
openssl-urandom-reseeding.patch | ||
openssl.changes | ||
openssl.keyring | ||
openssl.spec | ||
openssl.test | ||
README-FIPS.txt | ||
README.SUSE |
Please note that the man pages for the openssl libraries and tools have been placed in a package on its own right: openssl-doc Please install the openssl-doc package if you need the man pages, HTML documentation or sample C programs. The C header files and static libraries have also been extracted, they can now be found in the openssl-devel package. Your SuSE Team.