Next | Query returned 437 messages, browsing 1 to 10 | Previous

History of commit frequency

CVS Commit History:


   2024-12-24 16:30:30 by Adam Ciarcinski | Files touched by this commit (3) | Package updated
Log message:
openssl: updated to 3.4.0

OpenSSL 3.4

Major changes between OpenSSL 3.3 and OpenSSL 3.4.0 [22 Oct 2024]

OpenSSL 3.4.0 is a feature release adding significant new functionality to OpenSSL.

This release incorporates the following potentially significant or incompatible \ 
changes:

Deprecation of TS_VERIFY_CTX_set_* functions and addition of replacement \ 
TS_VERIFY_CTX_set0_* functions with improved semantics

Redesigned use of OPENSSLDIR/ENGINESDIR/MODULESDIR on Windows such that what \ 
were formerly build time locations can now be defined at run time with registry \ 
keys

The X25519 and X448 key exchange implementation in the FIPS provider is \ 
unapproved and has fips=no property.

SHAKE-128 and SHAKE-256 implementations have no default digest length anymore. \ 
That means these algorithms cannot be used with EVP_DigestFinal/_ex() unless the \ 
xoflen param is set before.

Setting config_diagnostics=1 in the config file will cause errors to be returned \ 
from SSL_CTX_new() and SSL_CTX_new_ex() if there is an error in the ssl module \ 
configuration.

An empty renegotiate extension will be used in TLS client hellos instead of the \ 
empty renegotiation SCSV, for all connections with a minimum TLS version > \ 
1.0.

Deprecation of SSL_SESSION_get_time(), SSL_SESSION_set_time() and \ 
SSL_CTX_flush_sessions() functions in favor of their respective _ex functions \ 
which are Y2038-safe on platforms with Y2038-safe time_t

This release adds the following new features:

Support for directly fetched composite signature algorithms such as RSA-SHA2-256 \ 
including new API functions

FIPS indicators support in the FIPS provider and various updates of the FIPS \ 
provider required for future FIPS 140-3 validations

Implementation of RFC 9579 (PBMAC1) in PKCS#12

An optional additional random seed source RNG JITTER using a statically linked \ 
jitterentropy library

New options -not_before and -not_after for explicit setting start and end dates \ 
of certificates created with the req and x509 apps

Support for integrity-only cipher suites TLS_SHA256_SHA256 and TLS_SHA384_SHA384 \ 
in TLS 1.3, as defined in RFC 9150

Support for requesting CRL in CMP

Support for additional X.509v3 extensions related to Attribute Certificates

Initial Attribute Certificate (RFC 5755) support

Possibility to customize ECC groups initialization to use precomputed values to \ 
save CPU time and use of this feature by the P-256 implementation
   2024-09-17 13:31:52 by Nia Alarie | Files touched by this commit (1)
Log message:
openssl: Fix build by defining USE_TIMEGM on old Darwin versions
   2024-09-06 15:47:10 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
openssl: updated to 3.3.2

OpenSSL 3.3.2 is now available, including bug and security fixes: please \ 
download and upgrade!
   2024-06-05 09:47:33 by Adam Ciarcinski | Files touched by this commit (3) | Package updated
Log message:
openssl: updated to 3.3.1

Changes between 3.3.0 and 3.3.1 [4 Jun 2024]

 * Fixed potential use after free after SSL_free_buffers() is called.

   The SSL_free_buffers function is used to free the internal OpenSSL
   buffer used when processing an incoming record from the network.
   The call is only expected to succeed if the buffer is not currently
   in use. However, two scenarios have been identified where the buffer
   is freed even when still in use.

   The first scenario occurs where a record header has been received
   from the network and processed by OpenSSL, but the full record body
   has not yet arrived. In this case calling SSL_free_buffers will succeed
   even though a record has only been partially processed and the buffer
   is still in use.

   The second scenario occurs where a full record containing application
   data has been received and processed by OpenSSL but the application has
   only read part of this data. Again a call to SSL_free_buffers will
   succeed even though the buffer is still in use.

   ([CVE-2024-4741])

 * Fixed an issue where checking excessively long DSA keys or parameters may
   be very slow.

   Applications that use the functions EVP_PKEY_param_check() or
   EVP_PKEY_public_check() to check a DSA public key or DSA parameters may
   experience long delays. Where the key or parameters that are being checked
   have been obtained from an untrusted source this may lead to a Denial of
   Service.

   To resolve this issue DSA keys larger than OPENSSL_DSA_MAX_MODULUS_BITS
   will now fail the check immediately with a DSA_R_MODULUS_TOO_LARGE error
   reason.

   ([CVE-2024-4603])
   2024-05-31 18:22:21 by Aleksey Cheusov | Files touched by this commit (2)
Log message:
Fix build on 64-bit big-endian Linux/PowerPC (32-bit vs. 64-bit)
   2024-05-01 23:11:18 by Nia Alarie | Files touched by this commit (1)
Log message:
openssl: Threads broken with Darwin/ppc, pointed out by schmonz
   2024-04-16 17:47:25 by Jonathan Perkin | Files touched by this commit (1)
Log message:
openssl: Use consistent socket interfaces on SunOS.

The OpenSSL codebase is a forest of preprocessor usage so it's hard to say
exactly what's going wrong, but there's definitely inconsistent use across
the codebase, resulting in socket failures when trying to use QUIC.

Ensure recvmsg/CMSG_* interfaces are available, fixing test suite as well
as some real world regressions (e.g. devel/py-poetry) noticed by users.
   2024-04-16 09:19:48 by Thomas Klausner | Files touched by this commit (1)
Log message:
openssl: use --libdir as openssl wants it

Fixes pkg-config files.

Closes PR 58157 by Colin Simmonds.

Bump PKGREVISION.
   2024-04-10 12:34:13 by Thomas Klausner | Files touched by this commit (1)
Log message:
openssl: sh3 is not a valid MACHINE_ARCH, split into sh3eb/sh3el
   2024-04-10 07:23:16 by Adam Ciarcinski | Files touched by this commit (1)
Log message:
openssl: fix PLIST

Next | Query returned 437 messages, browsing 1 to 10 | Previous