Change logs for openssl source package in Artful

  • openssl (1.0.2g-1ubuntu13.6) artful-security; urgency=medium
    
      * SECURITY UPDATE: ECDSA key extraction side channel
        - debian/patches/CVE-2018-0495.patch: add blinding to an ECDSA
          signature in crypto/ecdsa/ecdsatest.c, crypto/ecdsa/ecs_ossl.c.
        - CVE-2018-0495
      * SECURITY UPDATE: denial of service via long prime values
        - debian/patches/CVE-2018-0732.patch: reject excessively large primes
          in DH key generation in crypto/dh/dh_key.c.
        - CVE-2018-0732
      * SECURITY UPDATE: RSA cache timing side channel attack
        (previous update was incomplete)
        - debian/patches/CVE-2018-0737-1.patch: replaced variable-time GCD in
          crypto/rsa/rsa_gen.c.
        - debian/patches/CVE-2018-0737-2.patch: used ERR set/pop mark in
          crypto/rsa/rsa_gen.c.
        - debian/patches/CVE-2018-0737-3.patch: consttime flag changed in
          crypto/rsa/rsa_gen.c.
        - debian/patches/CVE-2018-0737-4.patch: ensure BN_mod_inverse and
          BN_mod_exp_mont both get called with BN_FLG_CONSTTIME flag set in
          crypto/rsa/rsa_gen.c.
        - CVE-2018-0737
    
     -- Marc Deslauriers <email address hidden>  Wed, 20 Jun 2018 07:32:59 -0400
  • openssl (1.0.2g-1ubuntu13.5) artful-security; urgency=medium
    
      * SECURITY UPDATE: Cache timing side channel
        - debian/patches/CVE-2018-0737.patch: ensure BN_mod_inverse
          and BN_mod_exp_mont get called with BN_FLG_CONSTTIME flag set
          in crypto/rsa/rsa_gen.c.
        - CVE-2018-0737
    
     -- <email address hidden> (Leonidas S. Barbosa)  Wed, 18 Apr 2018 15:36:49 -0300
  • openssl (1.0.2g-1ubuntu13.4) artful-security; urgency=medium
    
      * SECURITY UPDATE: DoS via ASN.1 types with a recursive definition
        - debian/patches/CVE-2018-0739.patch: limit stack depth in
          crypto/asn1/asn1.h, crypto/asn1/asn1_err.c, crypto/asn1/tasn_dec.c.
        - CVE-2018-0739
    
     -- Marc Deslauriers <email address hidden>  Tue, 27 Mar 2018 14:17:21 -0400
  • openssl (1.0.2g-1ubuntu13.3) artful-security; urgency=medium
    
      * SECURITY UPDATE: Read/write after SSL object in error state
        - debian/patches/CVE-2017-3737-pre.patch: add test/ssltestlib.*,
          add to test/Makefile.
        - debian/patches/CVE-2017-3737-1.patch: don't allow read/write after
          fatal error in ssl/ssl.h.
        - debian/patches/CVE-2017-3737-2.patch: add test to ssl/Makefile,
          ssl/fatalerrtest.c, test/Makefile.
        - CVE-2017-3737
      * SECURITY UPDATE: rsaz_1024_mul_avx2 overflow bug on x86_64
        - debian/patches/CVE-2017-3738.patch: fix digit correction bug in
          crypto/bn/asm/rsaz-avx2.pl.
        - CVE-2017-3738
    
     -- Marc Deslauriers <email address hidden>  Thu, 07 Dec 2017 13:16:22 -0500
  • openssl (1.0.2g-1ubuntu13.2) artful-security; urgency=medium
    
      * SECURITY UPDATE: Malformed X.509 IPAddressFamily could cause OOB read
        - debian/patches/CVE-2017-3735.patch: avoid out-of-bounds read in
          crypto/x509v3/v3_addr.c.
        - CVE-2017-3735
      * SECURITY UPDATE: bn_sqrx8x_internal carry bug on x86_64
        - debian/patches/CVE-2017-3736.patch: fix carry bug in
          bn_sqrx8x_internal in crypto/bn/asm/x86_64-mont5.pl.
        - CVE-2017-3736
      * debian/patches/fix_armhf_ftbfs.patch: fix build with gcc-7.2 on armhf.
        (LP: #1729850)
    
     -- Marc Deslauriers <email address hidden>  Mon, 06 Nov 2017 07:56:00 -0500
  • openssl (1.0.2g-1ubuntu13) artful; urgency=medium
    
      * aes/asm/aesni-sha*-x86_64.pl: fix IV handling in SHAEXT paths.
        (LP: #1674399)
    
     -- William Grant <email address hidden>  Fri, 19 May 2017 18:31:50 +1000
  • openssl (1.0.2g-1ubuntu12) artful; urgency=medium
    
      * crypto/x86*cpuid.pl: move extended feature detection. (LP: #1674399)
        This fix moves extended feature detection past basic feature
        detection where it belongs. 32-bit counterpart is harmonized too.
    
     -- Eric Desrochers <email address hidden>  Tue, 25 Apr 2017 18:16:18 -0400
  • openssl (1.0.2g-1ubuntu11) zesty; urgency=medium
    
      * SECURITY UPDATE: Montgomery multiplication may produce incorrect
        results
        - debian/patches/CVE-2016-7055.patch: fix logic in
          crypto/bn/asm/x86_64-mont.pl.
        - CVE-2016-7055
      * SECURITY UPDATE: DoS via warning alerts
        - debian/patches/CVE-2016-8610.patch: don't allow too many consecutive
          warning alerts in ssl/d1_pkt.c, ssl/s3_pkt.c, ssl/ssl.h,
          ssl/ssl_locl.h.
        - debian/patches/CVE-2016-8610-2.patch: fail if an unrecognised record
          type is received in ssl/s3_pkt.c.
        - CVE-2016-8610
      * SECURITY UPDATE: Truncated packet could crash via OOB read
        - debian/patches/CVE-2017-3731.patch: harden RC4_MD5 cipher in
          crypto/evp/e_rc4_hmac_md5.c.
        - CVE-2017-3731
      * SECURITY UPDATE: BN_mod_exp may produce incorrect results on x86_64
        - debian/patches/CVE-2017-3732.patch: fix carry bug in
          bn_sqr8x_internal in crypto/bn/asm/x86_64-mont5.pl.
        - CVE-2017-3732
    
     -- Marc Deslauriers <email address hidden>  Mon, 30 Jan 2017 09:00:43 -0500