Secure Sockets and Transport Layer Security

Edit Package openssl

The OpenSSL Project is a collaborative effort to develop a robust,
commercial-grade, full-featured, and open source toolkit implementing
the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS
v1) protocols with full-strength cryptography. The project is managed
by a worldwide community of volunteers that use the Internet to
communicate, plan, and develop the OpenSSL toolkit and its related
documentation.

Derivation and License

OpenSSL is based on the excellent SSLeay library developed by Eric A.
Young and Tim J. Hudson. The OpenSSL toolkit is licensed under an
Apache-style license, which basically means that you are free to get it
and to use it for commercial and noncommercial purposes.

Refresh
Refresh
Source Files
Filename Size Changed
0001-Axe-builtin-printf-implementation-use-glibc-instead.patch 0000022482 22 KB
0001-libcrypto-Hide-library-private-symbols.patch 0000031989 31.2 KB
0005-libssl-Hide-library-private-symbols.patch 0000005200 5.08 KB
README-FIPS.txt 0000009637 9.41 KB
README.SUSE 0000000370 370 Bytes
VIA_padlock_support_on_64systems.patch 0000007419 7.25 KB
baselibs.conf 0000000295 295 Bytes
bug610223.patch 0000000431 431 Bytes
compression_methods_switch.patch 0000002044 2 KB
merge_from_0.9.8k.patch 0000002655 2.59 KB
openssl-1.0.0-c_rehash-compat.diff 0000001241 1.21 KB
openssl-1.0.1c-default-paths.patch 0000002698 2.63 KB
openssl-1.0.1c-ipv6-apps.patch 0000013486 13.2 KB
openssl-1.0.1e-add-suse-default-cipher-header.patch 0000001149 1.12 KB
openssl-1.0.1e-add-suse-default-cipher.patch 0000001941 1.9 KB
openssl-1.0.1e-add-test-suse-default-cipher-suite.patch 0000000925 925 Bytes
openssl-1.0.1e-fips-ctor.patch 0000004523 4.42 KB
openssl-1.0.1e-fips-ec.patch 0000056956 55.6 KB
openssl-1.0.1e-fips.patch 0000599582 586 KB
openssl-1.0.1e-new-fips-reqs.patch 0000035530 34.7 KB
openssl-1.0.1e-truststore.diff 0000000625 625 Bytes
openssl-1.0.1i.tar.gz 0004422117 4.22 MB
openssl-1.0.1i.tar.gz.asc 0000000473 473 Bytes
openssl-fips-hidden.patch 0000000932 932 Bytes
openssl-fix-pod-syntax.diff 0000007682 7.5 KB
openssl-gcc-attributes.patch 0000002101 2.05 KB
openssl-libssl-noweakciphers.patch 0000000588 588 Bytes
openssl-no-egd.patch 0000000721 721 Bytes
openssl-ocloexec.patch 0000005400 5.27 KB
openssl-pkgconfig.patch 0000001358 1.33 KB
openssl.changes 0000075265 73.5 KB
openssl.keyring 0000011616 11.3 KB
openssl.spec 0000016610 16.2 KB
openssl.test 0000000063 63 Bytes
Revision 121 (latest revision is 171)
Stephan Kulow's avatar Stephan Kulow (coolo) accepted request 245642 from Marcus Meissner's avatar Marcus Meissner (msmeissn) (revision 121)
- openssl.keyring: the 1.0.1i release was done by 
  Matt Caswell <matt@openssl.org> UK 0E604491

- rename README.SuSE (old spelling) to README.SUSE (bnc#889013)

- update to 1.0.1i
  * Fix SRP buffer overrun vulnerability. Invalid parameters passed to the
    SRP code can be overrun an internal buffer. Add sanity check that
    g, A, B < N to SRP code.
    (CVE-2014-3512)
  * A flaw in the OpenSSL SSL/TLS server code causes the server to negotiate
    TLS 1.0 instead of higher protocol versions when the ClientHello message
    is badly fragmented. This allows a man-in-the-middle attacker to force a
    downgrade to TLS 1.0 even if both the server and the client support a
    higher protocol version, by modifying the client's TLS records.
    (CVE-2014-3511)
  * OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject
    to a denial of service attack. A malicious server can crash the client
    with a null pointer dereference (read) by specifying an anonymous (EC)DH
    ciphersuite and sending carefully crafted handshake messages.
    (CVE-2014-3510)
  * By sending carefully crafted DTLS packets an attacker could cause openssl
    to leak memory. This can be exploited through a Denial of Service attack.
    (CVE-2014-3507)
  * An attacker can force openssl to consume large amounts of memory whilst
    processing DTLS handshake messages. This can be exploited through a
    Denial of Service attack.
    (CVE-2014-3506)
  * An attacker can force an error condition which causes openssl to crash
    whilst processing DTLS packets due to memory being freed twice. This
Comments 10

Thiru Shetty's avatar

Can anyone explain, openssl-1.0.2i-new-fips-reqs.patch is for what and which code based ? I'm unable to map to any code base either openssl-1.0.2i nor openssl-fips which found in https://www.openssl.org/


Marcus Meissner's avatar

It is from a seperate FIPS patchset which we used for FIPS certification of openssl in SLES 12 and SLES 12 SP2.


Thiru Shetty's avatar

Can i get the source copy of it ?


Marcus Meissner's avatar

check out these sources: SUSE:SLE-12-SP2:Update openssl


Thiru Shetty's avatar

I'm sorry, couldn't able to locate the exact link. If you don't mind can you help me to point the link ?



Thiru Shetty's avatar

Thanks a lot. anyway i can't find openssl-1.0.2i-new-fips-reqs.patch in this path of any updation. I think it's been deleted, prior to this can find openssl-1.0.1i-new-fips-reqs.patch.



Thiru Shetty's avatar

Thank you, got it. Basically the New requirements of FIPS 140-2 RSA/DSA were adopted from Red Hat Inc right ?


Marcus Meissner's avatar

The patchset is largely from Redhat, we did some small adaptions to even stricter FIPS requirements but I do not recall the details.

openSUSE Build Service is sponsored by