Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package openssl-1_0_0 for openSUSE:Factory 
checked in at 2023-06-29 17:27:52
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/openssl-1_0_0 (Old)
 and      /work/SRC/openSUSE:Factory/.openssl-1_0_0.new.13546 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "openssl-1_0_0"

Thu Jun 29 17:27:52 2023 rev:38 rq:1095763 version:1.0.2u

Changes:
--------
--- /work/SRC/openSUSE:Factory/openssl-1_0_0/openssl-1_0_0.changes      
2023-06-28 10:21:36.228132248 +0200
+++ /work/SRC/openSUSE:Factory/.openssl-1_0_0.new.13546/openssl-1_0_0.changes   
2023-06-29 17:28:12.966219859 +0200
@@ -1,0 +2,21 @@
+Tue Jun 20 15:18:56 UTC 2023 - Otto Hollmann <otto.hollm...@suse.com>
+
+- Improve cross-package provides/conflicts [boo#1210313]
+  * Remove Conflicts: ssl
+  * Add Conflicts: openssl(cli)
+
+-------------------------------------------------------------------
+Wed Jun 14 09:34:20 UTC 2023 - Otto Hollmann <otto.hollm...@suse.com>
+
+- Security Fix: [bsc#1207534, CVE-2022-4304]
+  * Reworked the Fix for the Timing Oracle in RSA Decryption
+    The previous fix for this timing side channel turned out to cause
+    a severe 2-3x performance regression in the typical use case
+    compared to 1.1.1s.
+  * Reworked openssl-CVE-2022-4304.patch
+  * Refreshed patches:
+    - openssl-CVE-2023-0286.patch
+    - openssl-CVE-2023-0464.patch
+    - openssl-CVE-2023-0465.patch
+
+-------------------------------------------------------------------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ openssl-1_0_0.spec ++++++
--- /var/tmp/diff_new_pack.Va8a9h/_old  2023-06-29 17:28:14.278227544 +0200
+++ /var/tmp/diff_new_pack.Va8a9h/_new  2023-06-29 17:28:14.282227568 +0200
@@ -136,8 +136,8 @@
 BuildRequires:  ed
 BuildRequires:  pkgconfig
 BuildRequires:  pkgconfig(zlib)
-Conflicts:      ssl
 Provides:       ssl
+Conflicts:      openssl(cli)
 Provides:       openssl(cli)
 
 %description
@@ -148,7 +148,6 @@
 
 %package -n libopenssl1_0_0
 Summary:        Secure Sockets and Transport Layer Security
-License:        OpenSSL
 Group:          Productivity/Networking/Security
 Recommends:     ca-certificates-mozilla
 # Merge back the hmac files bsc#1185116
@@ -163,7 +162,6 @@
 
 %package -n libopenssl10
 Summary:        Secure Sockets and Transport Layer Security
-License:        OpenSSL
 Group:          Productivity/Networking/Security
 
 %description -n libopenssl10
@@ -178,7 +176,6 @@
 
 %package -n libopenssl1_0_0-steam
 Summary:        Secure Sockets and Transport Layer Security for steam
-License:        OpenSSL
 Group:          Productivity/Networking/Security
 
 %description -n libopenssl1_0_0-steam
@@ -191,7 +188,6 @@
 
 %package -n libopenssl-1_0_0-devel
 Summary:        Development files for OpenSSL
-License:        OpenSSL
 Group:          Development/Libraries/C and C++
 Requires:       libopenssl1_0_0 = %{version}
 Requires:       pkgconfig(zlib)
@@ -208,7 +204,6 @@
 
 %package doc
 Summary:        Additional Package Documentation
-License:        OpenSSL
 Group:          Productivity/Networking/Security
 Conflicts:      openssl-doc
 Provides:       openssl-doc = %{version}
@@ -221,7 +216,6 @@
 
 %package cavs
 Summary:        CAVS testing framework and utilities
-License:        OpenSSL
 Group:          Productivity/Networking/Security
 Requires:       libopenssl1_0_0 = %{version}-%{release}
 


++++++ openssl-CVE-2022-4304.patch ++++++
++++ 1307 lines (skipped)
++++ between 
/work/SRC/openSUSE:Factory/openssl-1_0_0/openssl-CVE-2022-4304.patch
++++ and 
/work/SRC/openSUSE:Factory/.openssl-1_0_0.new.13546/openssl-CVE-2022-4304.patch

++++++ openssl-CVE-2023-0286.patch ++++++
--- /var/tmp/diff_new_pack.Va8a9h/_old  2023-06-29 17:28:14.478228716 +0200
+++ /var/tmp/diff_new_pack.Va8a9h/_new  2023-06-29 17:28:14.482228739 +0200
@@ -14,7 +14,7 @@
 +++ b/CHANGES
 @@ -9,6 +9,24 @@
  
-  Changes between 1.0.2o and 1.0.2p [14 Aug 2018]
+  Changes between 1.0.2t and 1.0.2u [20 Dec 2019]
  
 +  *) Fixed a type confusion vulnerability relating to X.400 address processing
 +     inside an X.509 GeneralName. X.400 addresses were parsed as an 
ASN1_STRING
@@ -34,9 +34,9 @@
 +
 +     [Hugo Landau]
 +
-   *) Client DoS due to large DH parameter
- 
-      During key agreement in a TLS handshake using a DH(E) based ciphersuite a
+   *) Fixed an an overflow bug in the x64_64 Montgomery squaring procedure
+      used in exponentiation with 512-bit moduli. No EC algorithms are
+      affected. Analysis suggests that attacks against 2-prime RSA1024,
 --- a/crypto/x509v3/v3_genn.c
 +++ b/crypto/x509v3/v3_genn.c
 @@ -148,7 +148,7 @@ int GENERAL_NAME_cmp(GENERAL_NAME *a, GE

++++++ openssl-CVE-2023-0464.patch ++++++
--- /var/tmp/diff_new_pack.Va8a9h/_old  2023-06-29 17:28:14.494228810 +0200
+++ /var/tmp/diff_new_pack.Va8a9h/_new  2023-06-29 17:28:14.498228833 +0200
@@ -27,7 +27,7 @@
 +++ b/CHANGES
 @@ -9,6 +9,14 @@
  
-  Changes between 1.0.2o and 1.0.2p [14 Aug 2018]
+  Changes between 1.0.2t and 1.0.2u [20 Dec 2019]
  
 +  *) Limited the number of nodes created in a policy tree to mitigate
 +     against CVE-2023-0464.  The default limit is set to 1000 nodes, which

++++++ openssl-CVE-2023-0465.patch ++++++
--- /var/tmp/diff_new_pack.Va8a9h/_old  2023-06-29 17:28:14.510228903 +0200
+++ /var/tmp/diff_new_pack.Va8a9h/_new  2023-06-29 17:28:14.514228927 +0200
@@ -30,9 +30,9 @@
 +     certificate altogether. (CVE-2023-0465)
 +     [Matt Caswell]
 +
-   *) Fixed an an overflow bug in the x64_64 Montgomery squaring procedure
-      used in exponentiation with 512-bit moduli. No EC algorithms are
-      affected. Analysis suggests that attacks against 2-prime RSA1024,
+   *) Limited the number of nodes created in a policy tree to mitigate
+      against CVE-2023-0464.  The default limit is set to 1000 nodes, which
+      should be sufficient for most installations.  If required, the limit
 --- a/NEWS
 +++ b/NEWS
 @@ -7,6 +7,9 @@

Reply via email to