|
Bugzilla – Full Text Bug Listing |
| Summary: | OpenSSL PadLock support needs update | ||
|---|---|---|---|
| Product: | [openSUSE] SUSE LINUX 10.0 | Reporter: | Forgotten User mbQyAD5r4K <forgotten_mbQyAD5r4K> |
| Component: | Basesystem | Assignee: | Peter Poeml <poeml> |
| Status: | VERIFIED FIXED | QA Contact: | E-mail List <qa-bugs> |
| Severity: | Major | ||
| Priority: | P5 - None | CC: | novell |
| Version: | Final | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | http://www.logix.cz/michal/devel/padlock | ||
| Whiteboard: | |||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Forgotten User mbQyAD5r4K
2006-01-05 01:57:35 UTC
Michal, would the newer padlock version fix the problem reported in bug 141526? Is that the same issue as you encountered? Err ... _this_ is bug 141526 ;-) Sorry.. I meant bug 114671 :-) Quite likely. The old patch is known to fail in some circumstances, e.g. when the same EVP_CIPHER_CTX is reused for both encryption and decryption. These problems are very hard to debug as they are bound to timing and context switches - attach a debugger or recompile w/o -O2 and they're gone. I strongly recommend updating the PadLock patch in 10.0 openssl and release it as an online update. The patch is 100% backward compatible (except for the bugs :) and won't change anything for non-epia users. Back to ASSIGNED Harald, given the positive feedback in bug 114671 I want to update openssl in 10.0. Can you approve the fix? It has zero effect on boards without the VIA crypto hardware, therefore it is not risky. Peter, you have to ask me! Ok, approved: Maintenance-Tracker-3657 Harald, technically this update is only needed on 10.0-i386, neither on ppc nor x86_64. Is it okay with the patchinfo process to restrict DISTRIBUTION like that? (I guess so, but asking to make sure) Harald says that 10.0-i386 is sufficient. *** Bug 114671 has been marked as a duplicate of this bug. *** released |