Bug 1981415

Summary: unbound: don't use deprecated functions in OpenSSL 3.0
Product: Red Hat Enterprise Linux 9 Reporter: aegorenk
Component: unboundAssignee: Petr Menšík <pemensik>
Status: CLOSED ERRATA QA Contact: Petr Sklenar <psklenar>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 9.0CC: pemensik, psklenar
Target Milestone: betaKeywords: Triaged
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: unbound-1.16.0-1.el9 Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-11-15 10:15:56 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2087120    
Bug Blocks:    

Description aegorenk 2021-07-12 14:04:15 UTC
Description of problem:


Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:

Comment 3 Petr Menšík 2022-05-17 10:49:50 UTC
Functions shown as warning during latest RHEL9 build:

validator/val_secalgo.c:509:25: warning: 'EVP_PKEY_assign' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
validator/val_secalgo.c:546:25: warning: 'EVP_PKEY_assign' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
sldns/keyraw.c:228:9: warning: 'DSA_new' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
sldns/keyraw.c:244:9: warning: 'DSA_set0_pqg' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
sldns/keyraw.c:250:17: warning: 'DSA_free' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
sldns/keyraw.c:254:9: warning: 'DSA_set0_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
sldns/keyraw.c:256:17: warning: 'DSA_free' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
sldns/keyraw.c:307:9: warning: 'RSA_new' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
sldns/keyraw.c:320:9: warning: 'RSA_set0_key' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
sldns/keyraw.c:323:17: warning: 'RSA_free' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
sldns/keyraw.c:367:17: warning: 'EC_KEY_new_by_curve_name' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
sldns/keyraw.c:370:17: warning: 'EC_KEY_new_by_curve_name' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
sldns/keyraw.c:374:17: warning: 'EC_KEY_free' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
sldns/keyraw.c:381:9: warning: 'o2i_ECPublicKey' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
sldns/keyraw.c:382:17: warning: 'EC_KEY_free' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
sldns/keyraw.c:387:17: warning: 'EC_KEY_free' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
sldns/keyraw.c:390:9: warning: 'EVP_PKEY_assign' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
sldns/keyraw.c:392:17: warning: 'EC_KEY_free' is deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]

Comment 4 Petr Menšík 2022-05-17 10:52:19 UTC
It seems Fedora build of 1.15.0 does not contain any deprecated function anymore. Easiest way to get rid of deprecated functions would be rebase to the most recent version.

Comment 5 Petr Menšík 2022-07-07 09:47:50 UTC
Fixed as part of rebase

Comment 7 Petr Menšík 2022-08-09 12:03:27 UTC
Testing could be done by:

for SYMBOL in EVP_PKEY_assign DSA_new DSA_set0_pqg DSA_free DSA_set0_key RSA_new RSA_set0_key RSA_free EC_KEY_new_by_curve_name EC_KEY_free o2i_ECPublicKey EC_KEY_free
do
  objdump -T /usr/lib64/libunbound.so.8 | grep -w $SYMBOL && echo "Still references $SYMBOL"
done

Or just checking deprecated warnings in matching build.

Comment 18 errata-xmlrpc 2022-11-15 10:15:56 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: unbound security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:8062