SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for openssl-doc-1.0.1i-1.216.noarch.rpm :

* Tue Jan 31 2017 vcizekAATTsuse.com- OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)- ECSDA P-256 timing attack key recovery (bsc#1019334, CVE-2016-7056)- remote denial of service in SSL alert handling (bsc#1005878, CVE-2016-8610)- Truncated packet could crash via OOB read (bsc#1022085, CVE-2017-3731)- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)- fix crash in openssl speed (bsc#1000677)- added patches:
* openssl-CVE-2016-7056.patch
* openssl-CVE-2016-8610.patch
* openssl-CVE-2017-3731.patch
* openssl-fix_crash_in_openssl_speed.patch
* openssl-degrade_3DES_to_MEDIUM_in_SSL2.patch- add missing commit for CVE-2016-2108 (bsc#1004499)
* updated openssl-CVE-2016-2108.patch- fix X509_CERT_FILE path (bsc#1022271)
* updated openssl-1.0.1e-truststore.diff
* Fri Sep 23 2016 vcizekAATTsuse.com- resume reading from /dev/urandom when interrupted by a signal (bsc#995075)
* add openssl-randfile_fread_interrupt.patch
* Thu Sep 22 2016 vcizekAATTsuse.com- OpenSSL Security Advisory [22 Sep 2016] (bsc#999665) Severity: High
* OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666) Severity: Low
* Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575)
* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
* OOB read in TS_OBJ_print_bio() (CVE-2016-2180) (bsc#990419)
* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)- added patches:
* openssl-CVE-2016-2177.patch
* openssl-CVE-2016-2178.patch
* openssl-CVE-2016-2179.patch
* openssl-CVE-2016-2180.patch
* openssl-CVE-2016-2181.patch
* openssl-CVE-2016-2182.patch
* openssl-CVE-2016-2183.patch
* openssl-CVE-2016-6302.patch
* openssl-CVE-2016-6303.patch
* openssl-CVE-2016-6304.patch
* openssl-CVE-2016-6306.patch
* Wed Aug 03 2016 vcizekAATTsuse.com- update expired S/MIME certs (bsc#979475)
* add openssl-update-expired-smime-certs.patch- improve s390x performance (bsc#982745)
* add openssl-s390x_performance_improvements.patch- allow >= 64GB AESGCM transfers (bsc#988591)
* modify openssl-1.0.1i-new-fips-reqs.patch- fix crash in print_notice (bsc#998190)
* add openssl-print_notice-NULL_crash.patch
* Thu Apr 28 2016 vcizekAATTsuse.com- OpenSSL Security Advisory [3rd May 2016]
* Memory corruption in the ASN.1 encoder - bsc#977617 (CVE-2016-2108)
* Padding oracle in AES-NI CBC MAC check - bsc#977616 (CVE-2016-2107)
* EVP_EncodeUpdate overflow - bsc#977614 (CVE-2016-2105)
* EVP_EncryptUpdate overflow - bsc#977615 (CVE-2016-2106)
* ASN.1 BIO excessive memory allocation - bsc#976942 (CVE-2016-2109)
* add patches + openssl-CVE-2016-2105.patch + openssl-CVE-2016-2106.patch + openssl-CVE-2016-2107.patch + openssl-CVE-2016-2108.patch + openssl-CVE-2016-2109.patch- Fix buffer overrun in ASN1_parse (bsc#976943)
* add 0001-Fix-buffer-overrun-in-ASN1_parse.patch- Preserve digests for SNI (bsc#977621)
* add 0001-Preserve-digests-for-SNI.patch- Fix openssl enc -non-fips-allow option in FIPS mode (bsc#958501)
* modify openssl-fips-dont-fall-back-to-default-digest.patch
* Thu Feb 25 2016 psimonsAATTsuse.com- Fix CVE-2016-0702 (bnc#968050, \"Cache Bleed\"). The patch \"openssl-CVE-2016-0702-openssl101.patch\" prevents side channel attacks on modular exponentiation that attempted to recover RSA secret keys by analyzing cache-bank conflicts on the Intel Sandy-Bridge microarchitecture. The ability to exploit this issue was limited, however, as it required the attacker to have control of code running in a thread on the same hyper-threaded core as the victim thread which was performing decryptions.- Fix CVE-2016-0705 (bnc#968047) via \"openssl-CVE-2016-0705.patch\". This issue allowed attackers with the ability to load malformed DSA private keys into applications based on OpenSSL to trigger a double free() bug in OpenSSL\'s parser code. That scenario could be abused to facilitate a denial-of-service attack.- Fix CVE-2016-0797 (bnc#968048) via \"openssl-CVE-2016-0797.patch\". The BN_hex2bn() and BN_dec2bn() functions had a bug that could result in an attempt to de-reference a NULL pointer. This could have security consequences if these functions were ever called by user applications with large untrusted hex/decimal data. Also, internal usage of these functions in OpenSSL uses data from config files or application command line arguments. If user developed applications generated config file data based on untrusted data, then this could have had security consequences as well.- Fix CVE-2016-0800 (bnc#968046, \"Drown\"). OpenSSL used to be vulnerable to a cross-protocol attack that could lead to decryption of TLS sessions by using a server supporting SSLv2 and EXPORT cipher suites as a Bleichenbacher RSA padding oracle. The patch \"openssl-CVE-2016-0800-DROWN-disable-ssl2.patch\" remedies this issue by disabling the SSLv2 protocol (unless the environment variable $OPENSSL_ALLOW_SSL2 is defined) and all weak EXPORT ciphers (unless $OPENSSL_ALLOW_EXPORT is defined).- The PGP signature \"openssl-1.0.1i.tar.gz.asc\" of the OpenSSL release tarball was removed because the key that issued it uses insecure signature algorithms and can no longer be considered safe, i.e. having the signature around does not improve security.- Add patch \"openssl-fips-dont-fall-back-to-default-digest.patch\" to ensure that OpenSSL doesn\'t fall back to the default digest algorithm (SHA1) in case a non-FIPS algorithm was negotiated while running in FIPS mode. Instead, OpenSSL will refuse the session. (bnc#958501)- Fix CVE-2016-0798 via \"openssl-CVE-2016-0798-101.patch\". The SRP user database lookup method SRP_VBASE_get_by_user() had a memory leak that attackers could abuse to facility DoS attacks. To mitigate the issue, the seed handling in SRP_VBASE_get_by_user() was disabled even if the user has configured a seed. Applications are advised to migrate to SRP_VBASE_get1_by_user(). (bnc#968265)- Fix CVE-2016-0799 (bnc#968374) via \"openssl-CVE-2016-0799.patch\". On many 64 bit systems, the internal fmtstr() and doapr_outch() functions could miscalculate the length of a string and attempt to access out-of-bounds memory locations. These problems could have enabled attacks where large amounts of untrusted data is passed to the BIO_
*printf functions. If applications use these functions in this way then they could have been vulnerable. OpenSSL itself uses these functions when printing out human-readable dumps of ASN.1 data. Therefore applications that print this data could have been vulnerable if the data is from untrusted sources. OpenSSL command line applications could also have been vulnerable when they print out ASN.1 data, or if untrusted data is passed as command line arguments. Libssl is not considered directly vulnerable.
* Fri Feb 12 2016 vcizekAATTsuse.com- fix CVE-2015-3197 (bsc#963415)
* SSLv2 doesn\'t block disabled ciphers
* add openssl-CVE-2015-3197.patch
* Thu Dec 03 2015 vcizekAATTsuse.com- security fixes:
* Certificate verify crash with missing PSS parameter (CVE-2015-3194) (bsc#957815)
* X509_ATTRIBUTE memory leak (CVE-2015-3195) (bsc#957812)
* Race condition handling PSK identify hint (CVE-2015-3196) (bsc#957813)
* added patches: openssl-CVE-2015-3194.patch openssl-CVE-2015-3195.patch openssl-CVE-2015-3196.patch
* Mon Nov 09 2015 vcizekAATTsuse.com- improve s390 performance (bsc#954256)
* added 0001-bn-asm-s390x.S-improve-performance-on-z196-and-z13-b.patch
* Wed Nov 04 2015 meissnerAATTsuse.com- avoid running OPENSSL_config twice. This avoids breaking engine loading. (bsc#952871)- openssl.keyring: replaced with correct release engineer key
 
ICM