-
openssl (3.0.5-2ubuntu2.3) kinetic-security; urgency=medium
* SECURITY UPDATE: DoS in AES-XTS cipher decryption
- debian/patches/CVE-2023-1255.patch: avoid buffer overrread in
crypto/aes/asm/aesv8-armx.pl.
- CVE-2023-1255
* SECURITY UPDATE: Possible DoS translating ASN.1 object identifiers
- debian/patches/CVE-2023-2650.patch: restrict the size of OBJECT
IDENTIFIERs that OBJ_obj2txt will translate in
crypto/objects/obj_dat.c.
- CVE-2023-2650
* Replace CVE-2022-4304 fix with improved version
- debian/patches/CVE-2022-4304.patch: use alternative fix in
crypto/bn/bn_asm.c, crypto/bn/bn_blind.c, crypto/bn/bn_lib.c,
crypto/bn/bn_local.h, crypto/rsa/rsa_ossl.c.
-- Marc Deslauriers <email address hidden> Wed, 24 May 2023 13:11:31 -0400
-
openssl (3.0.5-2ubuntu2.2) kinetic-security; urgency=medium
* SECURITY UPDATE: double locking when processing X.509 certificate policy
constraints
- debian/patches/CVE-2022-3996-1.patch: revert commit 9aa4be69 and remove
redundant flag setting.
- debian/patches/CVE-2022-3996-2.patch: add test case for reported
deadlock.
- CVE-2022-3996
* SECURITY UPDATE: excessive resource use when verifying policy constraints
- debian/patches/CVE-2023-0464-1.patch: limit the number of nodes created
in a policy tree (the default limit is set to 1000 nodes).
- debian/patches/CVE-2023-0464-2.patch: add test cases for the policy
resource overuse.
- debian/patches/CVE-2023-0464-3.patch: disable the policy tree
exponential growth test conditionally.
- CVE-2023-0464
* SECURITY UPDATE: invalid certificate policies ignored in leaf certificates
- debian/patches/CVE-2023-0465-1.patch: ensure that EXFLAG_INVALID_POLICY
is checked even in leaf certs.
- debian/patches/CVE-2023-0465-2.patch: generate some certificates with
the certificatePolicies extension.
- debian/patches/CVE-2023-0465-3.patch: add a certificate policies test.
- CVE-2023-0466
* SECURITY UPDATE: certificate policy check in X509_VERIFY_PARAM_add0_policy
not enabled as documented
- debian/patches/CVE-2023-0466.patch: fix documentation of
X509_VERIFY_PARAM_add0_policy().
- CVE-2023-0466
-- Camila Camargo de Matos <email address hidden> Mon, 17 Apr 2023 15:14:07 -0300
-
openssl (3.0.5-2ubuntu2.1) kinetic-security; urgency=medium
* SECURITY UPDATE: X.509 Name Constraints Read Buffer Overflow
- debian/patches/CVE-2022-4203-1.patch: fix type confusion in
nc_match_single() in crypto/x509/v3_ncons.c.
- debian/patches/CVE-2022-4203-2.patch: add testcase for
nc_match_single type confusion in test/*.
- CVE-2022-4203
* SECURITY UPDATE: Timing Oracle in RSA Decryption
- debian/patches/CVE-2022-4304.patch: fix timing oracle in
crypto/bn/bn_blind.c, crypto/bn/bn_local.h, crypto/bn/build.info,
crypto/bn/rsa_sup_mul.c, crypto/rsa/rsa_ossl.c, include/crypto/bn.h.
- CVE-2022-4304
* SECURITY UPDATE: Double free after calling PEM_read_bio_ex
- debian/patches/CVE-2022-4450-1.patch: avoid dangling ptrs in header
and data params for PEM_read_bio_ex in crypto/pem/pem_lib.c.
- debian/patches/CVE-2022-4450-2.patch: add a test in test/pemtest.c.
- CVE-2022-4450
* SECURITY UPDATE: Use-after-free following BIO_new_NDEF
- debian/patches/CVE-2023-0215-1.patch: fix a UAF resulting from a bug
in BIO_new_NDEF in crypto/asn1/bio_ndef.c.
- debian/patches/CVE-2023-0215-2.patch: check CMS failure during BIO
setup with -stream is handled correctly in
test/recipes/80-test_cms.t, test/smime-certs/badrsa.pem.
- CVE-2023-0215
* SECURITY UPDATE: Invalid pointer dereference in d2i_PKCS7 functions
- debian/patches/CVE-2023-0216-1.patch: do not dereference PKCS7 object
data if not set in crypto/pkcs7/pk7_lib.c.
- debian/patches/CVE-2023-0216-2.patch: add test for d2i_PKCS7 NULL
dereference in test/recipes/25-test_pkcs7.t,
test/recipes/25-test_pkcs7_data/malformed.pkcs7.
- CVE-2023-0216
* SECURITY UPDATE: NULL dereference validating DSA public key
- debian/patches/CVE-2023-0217-1.patch: fix NULL deference when
validating FFC public key in crypto/ffc/ffc_key_validate.c,
include/internal/ffc.h, test/ffc_internal_test.c.
- debian/patches/CVE-2023-0217-2.patch: prevent creating DSA and DH
keys without parameters through import in
providers/implementations/keymgmt/dh_kmgmt.c,
providers/implementations/keymgmt/dsa_kmgmt.c.
- debian/patches/CVE-2023-0217-3.patch: do not create DSA keys without
parameters by decoder in crypto/x509/x_pubkey.c,
include/crypto/x509.h,
providers/implementations/encode_decode/decode_der2key.c.
- CVE-2023-0217
* SECURITY UPDATE: X.400 address type confusion in X.509 GeneralName
- debian/patches/CVE-2023-0286.patch: fix GENERAL_NAME_cmp for
x400Address in crypto/x509/v3_genn.c, include/openssl/x509v3.h.in,
test/v3nametest.c.
- CVE-2023-0286
* SECURITY UPDATE: NULL dereference during PKCS7 data verification
- debian/patches/CVE-2023-0401-1.patch: check return of BIO_set_md()
calls in crypto/pkcs7/pk7_doit.c.
- debian/patches/CVE-2023-0401-2.patch: add testcase for missing return
check of BIO_set_md() calls in test/recipes/80-test_cms.t,
test/recipes/80-test_cms_data/pkcs7-md4.pem.
- CVE-2023-0401
-- Marc Deslauriers <email address hidden> Mon, 06 Feb 2023 12:57:17 -0500
-
openssl (3.0.5-2ubuntu2) kinetic-security; urgency=medium
* SECURITY UPDATE: X.509 Email Address Buffer Overflow
- debian/patches/CVE-2022-3602-1.patch: fix off by one in punycode
decoder in crypto/punycode.c, test/build.info, test/punycode_test.c,
test/recipes/04-test_punycode.t.
- debian/patches/CVE-2022-3602-2.patch: ensure the result is zero
terminated in crypto/punycode.c.
- CVE-2022-3602
* SECURITY UPDATE: legacy custom cipher issue
- debian/patches/CVE-2022-3358.patch: fix usage of custom EVP_CIPHER
objects in crypto/evp/digest.c, crypto/evp/evp_enc.c.
- CVE-2022-3358
-- Marc Deslauriers <email address hidden> Thu, 27 Oct 2022 13:05:01 -0400
-
openssl (3.0.5-2ubuntu1) kinetic; urgency=low
* Merge from Debian unstable (LP: #1987047). Remaining changes:
- Replace duplicate files in the doc directory with symlinks.
- d/libssl3.postinst: Revert Debian deletion
+ Skip services restart & reboot notification if needrestart is in-use.
+ Bump version check to to 1.1.1.
+ Use a different priority for libssl1.1/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
+ Import libraries/restart-without-asking template as used by above.
- Add support for building with noudeb build profile.
- Revert "Enable system default config to enforce TLS1.2 as a
minimum" & "Increase default security level from 1 to 2".
- Set OPENSSL_TLS_SECURITY_LEVEL=2 as compiled-in minimum security
level. Change meaning of SECURITY_LEVEL=2 to prohibit TLS versions
below 1.2 and update documentation. Previous default of 1, can be set
by calling SSL_CTX_set_security_level(), SSL_set_security_level() or
using ':@SECLEVEL=1' CipherString value in openssl.cfg.
- Use perl:native in the autopkgtest for installability on i386.
- d/p/skip_tls1.1_seclevel3_tests.patch: new Ubuntu-specific patch for the
testsuite
- d/p/Set-systemwide-default-settings-for-libssl-users: partially apply it
on Ubuntu to make it easier for user to change security level
* Dropped changes, merged upstream:
- d/p/fix-avx512-overflow.patch: Cherry-picked from upstream to fix a 3.0.4
regression on AVX-512 capable CPUs.
* Revert the provider removal from the default configuration, following
discussions on LP: #1979639
openssl (3.0.5-2) unstable; urgency=medium
* Update to commit ce3951fc30c7b ("VC++ 2008 or earlier x86 compilers…")
(Closes: #1016290).
openssl (3.0.5-1) unstable; urgency=medium
* Import 3.0.5
- Possible module_list_lock crash (Closes: #1013309).
- CVE-2022-2097 (AES OCB fails to encrypt some bytes).
* Update to 55461bf22a57a ("Don't try to make configuration leaner")
* Use -latomic on arc,nios2 and sparc (Closes: #1015792).
openssl (3.0.4-2) unstable; urgency=medium
* Address a AVX2 related memory corruption (Closes: #1013441)
(CVE-2022-2274).
-- Simon Chopin <email address hidden> Fri, 19 Aug 2022 10:05:04 +0200
-
openssl (3.0.4-1ubuntu1) kinetic; urgency=medium
* Merge from Debian unstable (LP: #1979639). Remaining changes:
- Replace duplicate files in the doc directory with symlinks.
- d/libssl3.postinst: Revert Debian deletion
+ Skip services restart & reboot notification if needrestart is in-use.
+ Bump version check to to 1.1.1.
+ Use a different priority for libssl1.1/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
+ Import libraries/restart-without-asking template as used by above.
- Add support for building with noudeb build profile.
- Revert "Enable system default config to enforce TLS1.2 as a
minimum" & "Increase default security level from 1 to 2".
- Set OPENSSL_TLS_SECURITY_LEVEL=2 as compiled-in minimum security
level. Change meaning of SECURITY_LEVEL=2 to prohibit TLS versions
below 1.2 and update documentation. Previous default of 1, can be set
by calling SSL_CTX_set_security_level(), SSL_set_security_level() or
using ':@SECLEVEL=1' CipherString value in openssl.cfg.
- Use perl:native in the autopkgtest for installability on i386.
- d/p/skip_tls1.1_seclevel3_tests.patch: new Ubuntu-specific patch for the
testsuite
- d/p/Set-systemwide-default-settings-for-libssl-users: partially apply it
on Ubuntu to make it easier for user to change security level
* Dropped changes, merged upstream:
- Add some more string comparison fixes
- d/p/lp1947588.patch: Cherry-picked as our patches make it very easy to
trigger the underlying bug
- d/p/lp1978093/*: renew some expiring test certificates
* d/p/fix-avx512-overflow.patch: Cherry-picked from upstream to fix a 3.0.4
regression on AVX-512 capable CPUs.
openssl (3.0.4-1) unstable; urgency=medium
* Import 3.0.3
- CVE-2022-2068 (The c_rehash script allows command injection)
openssl (3.0.3-8) unstable; urgency=medium
* Update to openssl-3.0 head.
* Avoid reusing the init_lock for a different purpose (Closes: #1011339).
openssl (3.0.3-7) unstable; urgency=medium
* Remove the provider section from the provided openssl.cnf
(Closes: #1011051).
openssl (3.0.3-6) unstable; urgency=medium
* Update to openssl-3.0 head which fixes the expired certs in the testsuite.
-- Simon Chopin <email address hidden> Thu, 23 Jun 2022 12:43:23 +0200
-
openssl (3.0.3-5ubuntu3) kinetic; urgency=medium
* d/p/lp1978093/*: renew some expiring test certificates (LP: #1978093)
-- Simon Chopin <email address hidden> Thu, 09 Jun 2022 13:20:55 +0200
-
openssl (3.0.3-5ubuntu2) kinetic; urgency=medium
* d/p/Set-systemwide-default-settings-for-libssl-users: don't comment out
the CipherString string to avoid an empty section.
-- Simon Chopin <email address hidden> Tue, 31 May 2022 13:02:15 +0200
-
openssl (3.0.3-5ubuntu1) kinetic; urgency=medium
* Merge with Debian unstable (LP: #1974035):
Remaining change:
- Replace duplicate files in the doc directory with symlinks.
- d/libssl3.postinst: Revert Debian deletion
+ Skip services restart & reboot notification if needrestart is in-use.
+ Bump version check to to 1.1.1.
+ Use a different priority for libssl1.1/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
+ Import libraries/restart-without-asking template as used by above.
- Add support for building with noudeb build profile.
- Revert "Enable system default config to enforce TLS1.2 as a
minimum" & "Increase default security level from 1 to 2".
- Set OPENSSL_TLS_SECURITY_LEVEL=2 as compiled-in minimum security
level. Change meaning of SECURITY_LEVEL=2 to prohibit TLS versions
below 1.2 and update documentation. Previous default of 1, can be set
by calling SSL_CTX_set_security_level(), SSL_set_security_level() or
using ':@SECLEVEL=1' CipherString value in openssl.cfg.
- Use perl:native in the autopkgtest for installability on i386.
- d/p/skip_tls1.1_seclevel3_tests.patch: new Ubuntu-specific patch for the
testsuite
* Add some more string comparison fixes (LP: #1974037)
* d/p/Set-systemwide-default-settings-for-libssl-users: partially apply it on
Ubuntu to make it easier for user to change security level (LP: #1972056)
* d/p/lp1947588.patch: Cherry-picked as our patches make it very easy to
trigger the underlying bug (LP: #1947588)
-- Simon Chopin <email address hidden> Tue, 31 May 2022 09:49:54 +0200
-
openssl (3.0.3-0ubuntu1) kinetic; urgency=medium
* New upstream release (LP: #1968997):
- d/p/CVE-2022-*: dropped, present upstream
- d/p/c_rehash-compat.patch: refreshed
-- Simon Chopin <email address hidden> Thu, 05 May 2022 10:56:04 +0200
-
openssl (3.0.2-0ubuntu2) kinetic; urgency=medium
* SECURITY UPDATE: c_rehash script allows command injection
- debian/patches/CVE-2022-1292.patch: do not use shell to invoke
openssl in tools/c_rehash.in.
- CVE-2022-1292
* SECURITY UPDATE: OCSP_basic_verify may incorrectly verify the response
signing certificate
- debian/patches/CVE-2022-1343-1.patch: fix OCSP_basic_verify signer
certificate validation in crypto/ocsp/ocsp_vfy.c.
- debian/patches/CVE-2022-1343-2.patch: test ocsp with invalid
responses in test/recipes/80-test_ocsp.t.
- CVE-2022-1343
* SECURITY UPDATE: incorrect MAC key used in the RC4-MD5 ciphersuite
- debian/patches/CVE-2022-1434.patch: fix the RC4-MD5 cipher in
providers/implementations/ciphers/cipher_rc4_hmac_md5.c,
test/recipes/30-test_evp_data/evpciph_aes_stitched.txt,
test/recipes/30-test_evp_data/evpciph_rc4_stitched.txt.
- CVE-2022-1434
* SECURITY UPDATE: resource leakage when decoding certificates and keys
- debian/patches/CVE-2022-1473.patch: fix bug in OPENSSL_LH_flush in
crypto/lhash/lhash.c.
- CVE-2022-1473
-- Marc Deslauriers <email address hidden> Tue, 03 May 2022 12:01:34 -0400
-
openssl (3.0.2-0ubuntu1) jammy; urgency=medium
* New upstream bugfix release (LP: #1965141)
* d/p/skip_tls1.1_seclevel3_tests.patch: new Ubuntu-specific patch for the
testsuite
-- Simon Chopin <email address hidden> Wed, 16 Mar 2022 09:35:51 +0100