Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package openssl-1_0_0 for openSUSE:Factory 
checked in at 2023-06-28 10:21:35
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/openssl-1_0_0 (Old)
 and      /work/SRC/openSUSE:Factory/.openssl-1_0_0.new.13546 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "openssl-1_0_0"

Wed Jun 28 10:21:35 2023 rev:37 rq: version:1.0.2u

Changes:
--------
--- /work/SRC/openSUSE:Factory/openssl-1_0_0/openssl-1_0_0.changes      
2023-06-27 23:18:04.279887593 +0200
+++ /work/SRC/openSUSE:Factory/.openssl-1_0_0.new.13546/openssl-1_0_0.changes   
2023-06-28 10:21:36.228132248 +0200
@@ -2,21 +1,0 @@
-Tue Jun 20 15:18:56 UTC 2023 - Otto Hollmann <otto.hollm...@suse.com>
-
-- Improve cross-package provides/conflicts [boo#1210313]
-  * Remove Conflicts: ssl
-  * Add Conflicts: openssl(cli)
-
--------------------------------------------------------------------
-Wed Jun 14 09:34:20 UTC 2023 - Otto Hollmann <otto.hollm...@suse.com>
-
-- Security Fix: [bsc#1207534, CVE-2022-4304]
-  * Reworked the Fix for the Timing Oracle in RSA Decryption
-    The previous fix for this timing side channel turned out to cause
-    a severe 2-3x performance regression in the typical use case
-    compared to 1.1.1s.
-  * Reworked openssl-CVE-2022-4304.patch
-  * Refreshed patches:
-    - openssl-CVE-2023-0286.patch
-    - openssl-CVE-2023-0464.patch
-    - openssl-CVE-2023-0465.patch
-
--------------------------------------------------------------------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ openssl-1_0_0.spec ++++++
--- /var/tmp/diff_new_pack.O2oc0t/_old  2023-06-28 10:21:37.272138288 +0200
+++ /var/tmp/diff_new_pack.O2oc0t/_new  2023-06-28 10:21:37.276138311 +0200
@@ -136,8 +136,8 @@
 BuildRequires:  ed
 BuildRequires:  pkgconfig
 BuildRequires:  pkgconfig(zlib)
+Conflicts:      ssl
 Provides:       ssl
-Conflicts:      openssl(cli)
 Provides:       openssl(cli)
 
 %description
@@ -148,6 +148,7 @@
 
 %package -n libopenssl1_0_0
 Summary:        Secure Sockets and Transport Layer Security
+License:        OpenSSL
 Group:          Productivity/Networking/Security
 Recommends:     ca-certificates-mozilla
 # Merge back the hmac files bsc#1185116
@@ -162,6 +163,7 @@
 
 %package -n libopenssl10
 Summary:        Secure Sockets and Transport Layer Security
+License:        OpenSSL
 Group:          Productivity/Networking/Security
 
 %description -n libopenssl10
@@ -176,6 +178,7 @@
 
 %package -n libopenssl1_0_0-steam
 Summary:        Secure Sockets and Transport Layer Security for steam
+License:        OpenSSL
 Group:          Productivity/Networking/Security
 
 %description -n libopenssl1_0_0-steam
@@ -188,6 +191,7 @@
 
 %package -n libopenssl-1_0_0-devel
 Summary:        Development files for OpenSSL
+License:        OpenSSL
 Group:          Development/Libraries/C and C++
 Requires:       libopenssl1_0_0 = %{version}
 Requires:       pkgconfig(zlib)
@@ -204,6 +208,7 @@
 
 %package doc
 Summary:        Additional Package Documentation
+License:        OpenSSL
 Group:          Productivity/Networking/Security
 Conflicts:      openssl-doc
 Provides:       openssl-doc = %{version}
@@ -216,6 +221,7 @@
 
 %package cavs
 Summary:        CAVS testing framework and utilities
+License:        OpenSSL
 Group:          Productivity/Networking/Security
 Requires:       libopenssl1_0_0 = %{version}-%{release}
 


++++++ openssl-CVE-2022-4304.patch ++++++
++++ 1307 lines (skipped)
++++ between 
/work/SRC/openSUSE:Factory/openssl-1_0_0/openssl-CVE-2022-4304.patch
++++ and 
/work/SRC/openSUSE:Factory/.openssl-1_0_0.new.13546/openssl-CVE-2022-4304.patch

++++++ openssl-CVE-2023-0286.patch ++++++
--- /var/tmp/diff_new_pack.O2oc0t/_old  2023-06-28 10:21:37.472139446 +0200
+++ /var/tmp/diff_new_pack.O2oc0t/_new  2023-06-28 10:21:37.476139468 +0200
@@ -14,7 +14,7 @@
 +++ b/CHANGES
 @@ -9,6 +9,24 @@
  
-  Changes between 1.0.2t and 1.0.2u [20 Dec 2019]
+  Changes between 1.0.2o and 1.0.2p [14 Aug 2018]
  
 +  *) Fixed a type confusion vulnerability relating to X.400 address processing
 +     inside an X.509 GeneralName. X.400 addresses were parsed as an 
ASN1_STRING
@@ -34,9 +34,9 @@
 +
 +     [Hugo Landau]
 +
-   *) Fixed an an overflow bug in the x64_64 Montgomery squaring procedure
-      used in exponentiation with 512-bit moduli. No EC algorithms are
-      affected. Analysis suggests that attacks against 2-prime RSA1024,
+   *) Client DoS due to large DH parameter
+ 
+      During key agreement in a TLS handshake using a DH(E) based ciphersuite a
 --- a/crypto/x509v3/v3_genn.c
 +++ b/crypto/x509v3/v3_genn.c
 @@ -148,7 +148,7 @@ int GENERAL_NAME_cmp(GENERAL_NAME *a, GE

++++++ openssl-CVE-2023-0464.patch ++++++
--- /var/tmp/diff_new_pack.O2oc0t/_old  2023-06-28 10:21:37.488139538 +0200
+++ /var/tmp/diff_new_pack.O2oc0t/_new  2023-06-28 10:21:37.488139538 +0200
@@ -27,7 +27,7 @@
 +++ b/CHANGES
 @@ -9,6 +9,14 @@
  
-  Changes between 1.0.2t and 1.0.2u [20 Dec 2019]
+  Changes between 1.0.2o and 1.0.2p [14 Aug 2018]
  
 +  *) Limited the number of nodes created in a policy tree to mitigate
 +     against CVE-2023-0464.  The default limit is set to 1000 nodes, which

++++++ openssl-CVE-2023-0465.patch ++++++
--- /var/tmp/diff_new_pack.O2oc0t/_old  2023-06-28 10:21:37.500139607 +0200
+++ /var/tmp/diff_new_pack.O2oc0t/_new  2023-06-28 10:21:37.504139631 +0200
@@ -30,9 +30,9 @@
 +     certificate altogether. (CVE-2023-0465)
 +     [Matt Caswell]
 +
-   *) Limited the number of nodes created in a policy tree to mitigate
-      against CVE-2023-0464.  The default limit is set to 1000 nodes, which
-      should be sufficient for most installations.  If required, the limit
+   *) Fixed an an overflow bug in the x64_64 Montgomery squaring procedure
+      used in exponentiation with 512-bit moduli. No EC algorithms are
+      affected. Analysis suggests that attacks against 2-prime RSA1024,
 --- a/NEWS
 +++ b/NEWS
 @@ -7,6 +7,9 @@

Reply via email to