Path to this page:
./
security/openssl,
Secure Socket Layer and cryptographic library
Branch: CURRENT,
Version: 3.1.4,
Package name: openssl-3.1.4,
Maintainer: pkgsrc-usersThe OpenSSL Project is a collaborative effort to develop a
robust, commercial-grade, full-featured, and Open Source
toolkit implementing the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols as well as
a full-strength general purpose cryptography library. The
project is managed by a worldwide community of volunteers
that use the Internet to communicate, plan, and develop the
OpenSSL toolkit and its related documentation.
This package contains major version 3 of OpenSSL.
MESSAGE.SunOS [+/-]===========================================================================
$NetBSD: MESSAGE.SunOS,v 1.1 2011/01/20 16:25:21 tez Exp $
openssl may dump core on SunOS due to a bug in the Solaris linker which
erroneously pads .init segment with zeros [instead of nops]. Since the
bug is triggered at initialization, it can be seen with a simple test like
'openssl version'.
Some versions of gcc already contain a workaround, and the linker may be
fixed in some release. If you see the problem, there are details and a
fix for gcc at http://www.openssl.org/~appro/values.c which solves the
problem.
See also http://gnats.netbsd.org/43939
===========================================================================
Required to build:[
pkgtools/cwrappers]
Package options: threads
Master sites:
Filesize: 15204.541 KB
Version history: (Expand)
- (2023-10-25) Updated to version: openssl-3.1.4
- (2023-09-16) Updated to version: openssl-1.1.1w
- (2023-05-30) Updated to version: openssl-1.1.1u
- (2023-03-23) Updated to version: openssl-1.1.1tnb1
- (2023-02-09) Updated to version: openssl-1.1.1t
- (2022-11-05) Updated to version: openssl-1.1.1s
CVS history: (Expand)
2023-11-05 20:37:20 by Nia Alarie | Files touched by this commit (1) |
Log message:
openssl: Fix building on Mac OS X Tiger.
|
2023-10-27 20:30:12 by Jonathan Perkin | Files touched by this commit (4) |
Log message:
openssl: Various install fixes and improvements.
|
2023-10-25 00:11:51 by Thomas Klausner | Files touched by this commit (2298) |
Log message:
*: bump for openssl 3
|
2023-10-24 23:30:35 by Thomas Klausner | Files touched by this commit (8) |  |
Log message:
openssl: update to 3.1.4
This is the latest version of the currently newest supported branch.
The 1.1.x branch was de-supported in September.
Based on wip/openssl3 by gdt, tnn, and myself.
|
2023-09-16 04:54:58 by Adam Ciarcinski | Files touched by this commit (2) |  |
Log message:
openssl: updated to 1.1.1w
Changes between 1.1.1v and 1.1.1w [11 Sep 2023]
*) Fix POLY1305 MAC implementation corrupting XMM registers on Windows.
The POLY1305 MAC (message authentication code) implementation in OpenSSL
does not save the contents of non-volatile XMM registers on Windows 64
platform when calculating the MAC of data larger than 64 bytes. Before
returning to the caller all the XMM registers are set to zero rather than
restoring their previous content. The vulnerable code is used only on newer
x86_64 processors supporting the AVX512-IFMA instructions.
The consequences of this kind of internal application state corruption can
be various - from no consequences, if the calling application does not
depend on the contents of non-volatile XMM registers at all, to the worst
consequences, where the attacker could get complete control of the
application process. However given the contents of the registers are just
zeroized so the attacker cannot put arbitrary values inside, the most likely
consequence, if any, would be an incorrect result of some application
dependent calculations or a crash leading to a denial of service.
(CVE-2023-4807)
[Bernd Edlinger]
Changes between 1.1.1u and 1.1.1v [1 Aug 2023]
*) Fix excessive time spent checking DH q parameter value.
The function DH_check() performs various checks on DH parameters. After
fixing CVE-2023-3446 it was discovered that a large q parameter value can
also trigger an overly long computation during some of these checks.
A correct q value, if present, cannot be larger than the modulus p
parameter, thus it is unnecessary to perform these checks if q is larger
than p.
If DH_check() is called with such q parameter value,
DH_CHECK_INVALID_Q_VALUE return flag is set and the computationally
intensive checks are skipped.
(CVE-2023-3817)
[Tomáš Mráz]
|
2023-06-27 12:46:51 by Taylor R Campbell | Files touched by this commit (1) |
Log message:
security/openssl: Make this cross-compile.
|
2023-05-30 16:52:00 by Thomas Klausner | Files touched by this commit (5) |  |
Log message:
openssl: update to 1.1.1u.
Fixes a new CVE.
|
2023-03-23 07:16:22 by Thomas Klausner | Files touched by this commit (5) |  |
Log message:
openssl: update to 1.1.1tnb1.
Add upstream patches fixing CVE-2023-0464
|