Path to this page:
./
security/openssl,
Secure Socket Layer and cryptographic library
Branch: CURRENT,
Version: 1.1.1k,
Package name: openssl-1.1.1k,
Maintainer: pkgsrc-usersThe OpenSSL Project is a collaborative effort to develop a
robust, commercial-grade, full-featured, and Open Source
toolkit implementing the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols as well as
a full-strength general purpose cryptography library. The
project is managed by a worldwide community of volunteers
that use the Internet to communicate, plan, and develop the
OpenSSL toolkit and its related documentation.
MESSAGE.SunOS [+/-]===========================================================================
$NetBSD: MESSAGE.SunOS,v 1.1 2011/01/20 16:25:21 tez Exp $
openssl may dump core on SunOS due to a bug in the Solaris linker which
erroneously pads .init segment with zeros [instead of nops]. Since the
bug is triggered at initialization, it can be seen with a simple test like
'openssl version'.
Some versions of gcc already contain a workaround, and the linker may be
fixed in some release. If you see the problem, there are details and a
fix for gcc at http://www.openssl.org/~appro/values.c which solves the
problem.
See also http://gnats.netbsd.org/43939
===========================================================================
Required to build:[
pkgtools/cwrappers]
Package options: idea, md2, mdc2, rc5, threads
Master sites:
SHA1: bad9dc4ae6dcc1855085463099b5dacb0ec6130b
RMD160: 5c9fbbeae7d115e59be705162e58195517a37cae
Filesize: 9593.164 KB
Version history: (Expand)
- (2021-03-25) Updated to version: openssl-1.1.1k
- (2021-02-20) Updated to version: openssl-1.1.1j
- (2020-12-08) Updated to version: openssl-1.1.1i
- (2020-09-30) Updated to version: openssl-1.1.1h
- (2020-09-01) Updated to version: openssl-1.1.1gnb3
- (2020-07-13) Updated to version: openssl-1.1.1gnb2
CVS history: (Expand)
2021-03-25 17:36:19 by Jonathan Perkin | Files touched by this commit (2) |  |
Log message:
openssl: Update to 1.1.1k.
Approved by @wiz during freeze.
Changes between 1.1.1j and 1.1.1k [25 Mar 2021]
*) Fixed a problem with verifying a certificate chain when using the
X509_V_FLAG_X509_STRICT flag. This flag enables additional security checks
of the certificates present in a certificate chain. It is not set by
default.
Starting from OpenSSL version 1.1.1h a check to disallow certificates in
the chain that have explicitly encoded elliptic curve parameters was added
as an additional strict check.
An error in the implementation of this check meant that the result of a
previous check to confirm that certificates in the chain are valid CA
certificates was overwritten. This effectively bypasses the check
that non-CA certificates must not be able to issue other certificates.
If a "purpose" has been configured then there is a subsequent \
opportunity
for checks that the certificate is a valid CA. All of the named \
"purpose"
values implemented in libcrypto perform this check. Therefore, where
a purpose is set the certificate chain will still be rejected even when the
strict flag has been used. A purpose is set by default in libssl client and
server certificate verification routines, but it can be overridden or
removed by an application.
In order to be affected, an application must explicitly set the
X509_V_FLAG_X509_STRICT verification flag and either not set a purpose
for the certificate verification or, in the case of TLS client or server
applications, override the default purpose.
(CVE-2021-3450)
[Tomáš Mráz]
*) Fixed an issue where an OpenSSL TLS server may crash if sent a maliciously
crafted renegotiation ClientHello message from a client. If a TLSv1.2
renegotiation ClientHello omits the signature_algorithms extension (where
it was present in the initial ClientHello), but includes a
signature_algorithms_cert extension then a NULL pointer dereference will
result, leading to a crash and a denial of service attack.
A server is only vulnerable if it has TLSv1.2 and renegotiation enabled
(which is the default configuration). OpenSSL TLS clients are not impacted
by this issue.
(CVE-2021-3449)
[Peter Kästle and Samuel Sapalski]
|
2021-03-02 00:28:55 by Greg Troxel | Files touched by this commit (1) |
Log message:
seurity/openssl: Accomodate non-standard paths and cert bundles
Some systems choose unusual paths fro certs, and some use bundles.
Try to accomodate that, in particular by defining SSLCERTBUNDLE.
Patch concept from Thomas Orgis on tech-pkg, with no objections.
|
2021-02-20 09:53:23 by Thomas Klausner | Files touched by this commit (3) |  |
Log message:
openssl: update to 1.1.1j.
Major changes between OpenSSL 1.1.1i and OpenSSL 1.1.1j [16 Feb 2021]
o Fixed a NULL pointer deref in the X509_issuer_and_serial_hash()
function (CVE-2021-23841)
o Fixed the RSA_padding_check_SSLv23() function and the RSA_SSLV23_PADDING
padding mode to correctly check for rollback attacks
o Fixed an overflow in the EVP_CipherUpdate, EVP_EncryptUpdate and
EVP_DecryptUpdate functions (CVE-2021-23840)
o Fixed SRP_Calc_client_key so that it runs in constant time
|
2021-01-25 21:26:43 by Amitai Schleier | Files touched by this commit (1) |
Log message:
Fix build on OpenBSD by defining __STDC_NO_ATOMICS__.
|
2020-12-08 19:54:17 by Thomas Klausner | Files touched by this commit (3) |  |
Log message:
openssl: update to 1.1.1i.
Major changes between OpenSSL 1.1.1h and OpenSSL 1.1.1i [8 Dec 2020]
o Fixed NULL pointer deref in GENERAL_NAME_cmp (CVE-2020-1971)
|
2020-10-13 09:37:29 by Maya Rashish | Files touched by this commit (1) |
Log message:
openssl: add -lrt for the benefit of Solaris 10.
PR pkg/55688
PR pkg/54958
|
2020-09-30 11:25:31 by Thomas Klausner | Files touched by this commit (4) |  |
Log message:
openssl: update to 1.1.1h.
Major changes between OpenSSL 1.1.1g and OpenSSL 1.1.1h [22 Sep 2020]
o Disallow explicit curve parameters in verifications chains when
X509_V_FLAG_X509_STRICT is used
o Enable 'MinProtocol' and 'MaxProtocol' to configure both TLS and DTLS
contexts
o Oracle Developer Studio will start reporting deprecation warnings
|
2020-09-29 07:45:04 by Martin Husemann | Files touched by this commit (2) |
Log message:
Fix the build on sparc64 (and other architectures that use m4 to generate
asm files).
|