Change logs for openssl source package in Focal

  • openssl (1.1.1f-1ubuntu2.22) focal-security; urgency=medium
    
      * SECURITY UPDATE: Implicit rejection for RSA PKCS#1 (LP: #2054090)
        - debian/patches/openssl-1.1.1-pkcs1-implicit-rejection.patch:
          Return deterministic random output instead of an error in case
          there is a padding error in crypto/cms/cms_env.c,
          crypto/pkcs7/pk7_doit.c, crypto/rsa/rsa_local.h,
          crypto/rsa/rsa_ossl.c, crypto/rsa/rsa_pk1.c, crypto/rsa/rsa_pmeth.c,
          doc/man1/pkeyutl.pod, doc/man1/rsautl.pod,
          doc/man3/EVP_PKEY_CTX_ctrl.pod, doc/man3/EVP_PKEY_decrypt.pod,
          doc/man3/RSA_padding_add_PKCS1_type_1.pod,
          doc/man3/RSA_public_encrypt.pod, include/openssl/rsa.h and
          test/recipes/30-test_evp_data/evppkey.txt.
    
     -- David Fernandez Gonzalez <email address hidden>  Fri, 16 Feb 2024 16:41:31 +0100
  • openssl (1.1.1f-1ubuntu2.21) focal-security; urgency=medium
    
      * SECURITY UPDATE: Excessive time spent in DH check / generation with
        large Q parameter value
        - debian/patches/CVE-2023-5678.patch: make DH_check_pub_key() and
          DH_generate_key() safer yet in crypto/dh/dh_check.c,
          crypto/dh/dh_err.c, crypto/dh/dh_key.c, crypto/err/openssl.txt,
          include/openssl/dh.h, include/openssl/dherr.h.
        - CVE-2023-5678
      * SECURITY UPDATE: PKCS12 Decoding crashes
        - debian/patches/CVE-2024-0727.patch: add NULL checks where ContentInfo
          data can be NULL in crypto/pkcs12/p12_add.c,
          crypto/pkcs12/p12_mutl.c, crypto/pkcs12/p12_npas.c,
          crypto/pkcs7/pk7_mime.c.
        - CVE-2024-0727
    
     -- Marc Deslauriers <email address hidden>  Wed, 31 Jan 2024 15:45:27 -0500
  • openssl (1.1.1f-1ubuntu2.20) focal-security; urgency=medium
    
      * SECURITY UPDATE: denial of service
        - debian/patches/CVE-2023-3446.patch: adds check to prevent the testing of
          an excessively large modulus in DH_check().
        - CVE-2023-3446
      * SECURITY UPDATE: denial of service
        - debian/patches/CVE-2023-3817.patch: adds check to prevent the testing of
          invalid q values in DH_check().
        - CVE-2023-3817
    
     -- Ian Constantin <email address hidden>  Tue, 10 Oct 2023 12:03:48 +0300
  • openssl (1.1.1f-1ubuntu2.19) focal-security; urgency=medium
    
      * SECURITY UPDATE: Possible DoS translating ASN.1 object identifiers
        - debian/patches/CVE-2023-2650.patch: restrict the size of OBJECT
          IDENTIFIERs that OBJ_obj2txt will translate in
          crypto/objects/obj_dat.c.
        - CVE-2023-2650
      * Replace CVE-2022-4304 fix with improved version
        - debian/patches/CVE-2022-4304.patch: remove previous fix.
        - debian/patches/CVE-2022-4304-1.patch: use alternative fix in
          crypto/bn/bn_asm.c, crypto/bn/bn_blind.c, crypto/bn/bn_lib.c,
          crypto/bn/bn_local.h, crypto/rsa/rsa_ossl.c.
        - debian/patches/CVE-2022-4304-2.patch: re-add
          BN_F_OSSL_BN_RSA_DO_UNBLIND which was incorrectly removed in
          include/openssl/bnerr.h.
    
     -- Marc Deslauriers <email address hidden>  Wed, 24 May 2023 13:14:51 -0400
  • openssl (1.1.1f-1ubuntu2.18) focal-security; urgency=medium
    
      * SECURITY UPDATE: excessive resource use when verifying policy constraints
        - debian/patches/CVE-2023-0464-1.patch: limit the number of nodes created
          in a policy tree (the default limit is set to 1000 nodes).
        - debian/patches/CVE-2023-0464-2.patch: add test cases for the policy
          resource overuse.
        - debian/patches/CVE-2023-0464-3.patch: disable the policy tree
          exponential growth test conditionally.
        - CVE-2023-0464
      * SECURITY UPDATE: invalid certificate policies ignored in leaf certificates
        - debian/patches/CVE-2023-0465-1.patch: ensure that EXFLAG_INVALID_POLICY
          is checked even in leaf certs.
        - debian/patches/CVE-2023-0465-2.patch: generate some certificates with
          the certificatePolicies extension.
        - debian/patches/CVE-2023-0465-3.patch: add a certificate policies test.
        - CVE-2023-0466
      * SECURITY UPDATE: certificate policy check in X509_VERIFY_PARAM_add0_policy
        not enabled as documented
        - debian/patches/CVE-2023-0466.patch: fix documentation of
          X509_VERIFY_PARAM_add0_policy().
        - CVE-2023-0466
    
     -- Camila Camargo de Matos <email address hidden>  Mon, 17 Apr 2023 15:11:39 -0300
  • openssl (1.1.1f-1ubuntu2.17) focal-security; urgency=medium
    
      * SECURITY UPDATE: Timing Oracle in RSA Decryption
        - debian/patches/CVE-2022-4304.patch: fix timing oracle in
          crypto/bn/bn_blind.c, crypto/bn/bn_err.c, crypto/bn/bn_local.h,
          crypto/bn/build.info, crypto/bn/rsa_sup_mul.c,
          crypto/err/openssl.txt, crypto/rsa/rsa_ossl.c, include/crypto/bn.h,
          include/openssl/bnerr.h.
        - CVE-2022-4304
      * SECURITY UPDATE: Double free after calling PEM_read_bio_ex
        - debian/patches/CVE-2022-4450-1.patch: avoid dangling ptrs in header
          and data params for PEM_read_bio_ex in crypto/pem/pem_lib.c.
        - debian/patches/CVE-2022-4450-2.patch: add a test in test/pemtest.c.
        - CVE-2022-4450
      * SECURITY UPDATE: Use-after-free following BIO_new_NDEF
        - debian/patches/CVE-2023-0215-1.patch: fix a UAF resulting from a bug
          in BIO_new_NDEF in crypto/asn1/bio_ndef.c.
        - debian/patches/CVE-2023-0215-2.patch: check CMS failure during BIO
          setup with -stream is handled correctly in
          test/recipes/80-test_cms.t, test/smime-certs/badrsa.pem.
        - CVE-2023-0215
      * SECURITY UPDATE: X.400 address type confusion in X.509 GeneralName
        - debian/patches/CVE-2023-0286.patch: fix GENERAL_NAME_cmp for
          x400Address in crypto/x509/v3_genn.c, include/openssl/x509v3.h,
          test/v3nametest.c.
        - CVE-2023-0286
    
     -- Marc Deslauriers <email address hidden>  Mon, 06 Feb 2023 12:57:17 -0500
  • openssl (1.1.1f-1ubuntu2.16) focal-security; urgency=medium
    
      * SECURITY UPDATE: AES OCB fails to encrypt some bytes
        - debian/patches/CVE-2022-2097-1.patch: fix AES OCB encrypt/decrypt for
          x86 AES-NI in crypto/aes/asm/aesni-x86.pl.
        - debian/patches/CVE-2022-2097-2.patch: add AES OCB test vectors in
          test/recipes/30-test_evp_data/evpciph.txt.
        - CVE-2022-2097
    
     -- Marc Deslauriers <email address hidden>  Mon, 04 Jul 2022 07:24:28 -0400
  • openssl (1.1.1f-1ubuntu2.15) focal-security; urgency=medium
    
      * SECURITY UPDATE: c_rehash script allows command injection
        - debian/patches/CVE-2022-1292.patch: switch to upstream patch, and
          apply it before c_rehash-compat.patch.
        - debian/patches/CVE-2022-2068.patch: fix file operations in
          tools/c_rehash.in.
        - debian/patches/c_rehash-compat.patch: updated patch to apply after
          the security updates.
        - CVE-2022-2068
    
     -- Marc Deslauriers <email address hidden>  Wed, 15 Jun 2022 14:16:37 -0400
  • openssl (1.1.1f-1ubuntu2.14) focal; urgency=medium
    
      * d/p/lp1978093/*: renew some expiring test certificates (LP: #1978093)
      * d/p/lp1947588.patch: Cherry-picked as our patches make it very easy to
        trigger the underlying bug (LP: #1947588)
    
     -- Simon Chopin <email address hidden>  Fri, 10 Jun 2022 10:11:25 +0200
  • openssl (1.1.1f-1ubuntu2.13) focal-security; urgency=medium
    
      * SECURITY UPDATE: c_rehash script allows command injection
        - debian/patches/CVE-2022-1292.patch: do not use shell to invoke
          openssl in tools/c_rehash.in.
        - CVE-2022-1292
    
     -- Marc Deslauriers <email address hidden>  Tue, 03 May 2022 13:49:36 -0400
  • openssl (1.1.1f-1ubuntu2.12) focal-security; urgency=medium
    
      * SECURITY UPDATE: Infinite loop in BN_mod_sqrt()
        - debian/patches/CVE-2022-0778-1.patch: fix infinite loop in
          crypto/bn/bn_sqrt.c.
        - debian/patches/CVE-2022-0778-2.patch: add documentation of
          BN_mod_sqrt() in doc/man3/BN_add.pod.
        - debian/patches/CVE-2022-0778-3.patch: add a negative testcase for
          BN_mod_sqrt in test/bntest.c, test/recipes/10-test_bn_data/bnmod.txt.
        - CVE-2022-0778
    
     -- Marc Deslauriers <email address hidden>  Wed, 09 Mar 2022 07:12:45 -0500
  • openssl (1.1.1f-1ubuntu2.11) focal; urgency=medium
    
      * Fixup pointer authentication for armv8 systems that support it when
        using the poly1305 MAC, preventing segmentation faults. (LP: #1960863)
        - d/p/lp-1960863-crypto-poly1305-asm-fix-armv8-pointer-authenticat.patch
    
     -- Matthew Ruffell <email address hidden>  Tue, 15 Feb 2022 10:10:01 +1300
  • openssl (1.1.1f-1ubuntu2.10) focal; urgency=medium
    
      * Cherry-pick upstream fixes to prevent double engine loading (LP: #1951943)
    
     -- Julian Andres Klode <email address hidden>  Wed, 24 Nov 2021 14:20:48 +0100
  • openssl (1.1.1f-1ubuntu2.9) focal; urgency=medium
    
      * Cherry-pick stable patches to fix potential use-after-free. LP:
        #1940656
    
     -- Dimitri John Ledkov <email address hidden>  Wed, 25 Aug 2021 02:13:44 +0100
  • openssl (1.1.1f-1ubuntu2.8) focal-security; urgency=medium
    
      * SECURITY UPDATE: SM2 Decryption Buffer Overflow
        - debian/patches/CVE-2021-3711-1.patch: correctly calculate the length
          of SM2 plaintext given the ciphertext in crypto/sm2/sm2_crypt.c,
          crypto/sm2/sm2_pmeth.c, include/crypto/sm2.h,
          test/sm2_internal_test.c.
        - debian/patches/CVE-2021-3711-2.patch: extend tests for SM2 decryption
          in test/recipes/30-test_evp_data/evppkey.txt.
        - debian/patches/CVE-2021-3711-3.patch: check the plaintext buffer is
          large enough when decrypting SM2 in crypto/sm2/sm2_crypt.c.
        - CVE-2021-3711
      * SECURITY UPDATE: Read buffer overrun in X509_aux_print()
        - debian/patches/CVE-2021-3712.patch: fix a read buffer overrun in
          X509_aux_print() in crypto/x509/t_x509.c.
        - debian/patches/CVE-2021-3712-2.patch: fix i2v_GENERAL_NAME to not
          assume NUL terminated strings in crypto/x509v3/v3_alt.c,
          crypto/x509v3/v3_utl.c, include/crypto/x509.h.
        - debian/patches/CVE-2021-3712-3.patch: fix POLICYINFO printing to not
          assume NUL terminated strings in crypto/x509v3/v3_cpols.c.
        - debian/patches/CVE-2021-3712-4.patch: fix printing of
          PROXY_CERT_INFO_EXTENSION to not assume NUL terminated strings in
          crypto/x509v3/v3_pci.c.
        - debian/patches/CVE-2021-3712-5.patch: fix the name constraints code
          to not assume NUL terminated strings in crypto/x509v3/v3_ncons.c.
        - debian/patches/CVE-2021-3712-6.patch: fix test code to not assume NUL
          terminated strings in test/x509_time_test.c.
        - debian/patches/CVE-2021-3712-7.patch: fix append_ia5 function to not
          assume NUL terminated strings in crypto/x509v3/v3_utl.c.
        - debian/patches/CVE-2021-3712-8.patch: fix NETSCAPE_SPKI_print
          function to not assume NUL terminated strings in
          crypto/asn1/t_spki.c.
        - debian/patches/CVE-2021-3712-9.patch: fix
          EC_GROUP_new_from_ecparameters to check the base length in
          crypto/ec/ec_asn1.c.
        - debian/patches/CVE-2021-3712-10.patch: allow fuzz builds to detect
          string overruns in crypto/asn1/asn1_lib.c.
        - debian/patches/CVE-2021-3712-11.patch: fix the error handling in
          i2v_AUTHORITY_KEYID in crypto/x509v3/v3_akey.c.
        - debian/patches/CVE-2021-3712-12.patch: allow fuzz builds to detect
          string overruns in crypto/asn1/asn1_lib.c.
        - debian/patches/CVE-2021-3712-13.patch: fix the name constraints code
          to not assume NUL terminated strings in crypto/x509v3/v3_ncons.c.
        - debian/patches/CVE-2021-3712-14.patch: fix i2v_GENERAL_NAME to not
          assume NUL terminated strings in crypto/x509v3/v3_utl.c.
        - CVE-2021-3712
    
     -- Marc Deslauriers <email address hidden>  Mon, 23 Aug 2021 13:02:39 -0400
  • openssl (1.1.1f-1ubuntu2.5) focal; urgency=medium
    
      * Cherry-pick an upstream patch to fix s390x AES code (LP: #1931994)
    
     -- Simon Chopin <email address hidden>  Fri, 23 Jul 2021 14:32:42 +0200
  • openssl (1.1.1f-1ubuntu2.4) focal; urgency=medium
    
      * Allow x509 certificates which set basicConstraints=CA:FALSE,pathlen:0
        to validate, as it is common on self-signed leaf certificates.
        (LP: #1926254)
        - d/p/lp-1926254-1-Allow-certificates-with-Basic-Constraints-CA-fa.patch
        - d/p/lp-1926254-2-Set-X509_V_ERR_INVALID_EXTENSION-error-for-inva.patch
        - d/p/lp-1926254-3-Add-test-cases-for-the-non-CA-certificate-with-.patch
    
     -- Matthew Ruffell <email address hidden>  Wed, 28 Apr 2021 12:37:28 +1200
  • openssl (1.1.1f-1ubuntu2.3) focal-security; urgency=medium
    
      * SECURITY UPDATE: NULL pointer deref in signature_algorithms processing
        - debian/patches/CVE-2021-3449-1.patch: fix NULL pointer dereference in
          ssl/statem/extensions.c.
        - debian/patches/CVE-2021-3449-2.patch: teach TLSProxy how to encrypt
          <= TLSv1.2 ETM records in util/perl/TLSProxy/Message.pm.
        - debian/patches/CVE-2021-3449-3.patch: add a test to
          test/recipes/70-test_renegotiation.t.
        - debian/patches/CVE-2021-3449-4.patch: ensure buffer/length pairs are
          always in sync in ssl/s3_lib.c, ssl/ssl_lib.c,
          ssl/statem/extensions.c, ssl/statem/extensions_clnt.c,
          ssl/statem/statem_clnt.c, ssl/statem/statem_srvr.c.
        - CVE-2021-3449
    
     -- Marc Deslauriers <email address hidden>  Mon, 22 Mar 2021 07:37:17 -0400
  • openssl (1.1.1f-1ubuntu2.2) focal-security; urgency=medium
    
      * SECURITY UPDATE: Integer overflow in CipherUpdate
        - debian/patches/CVE-2021-23840.patch: don't overflow the output length
          in EVP_CipherUpdate calls in crypto/err/openssl.txt,
          crypto/evp/evp_enc.c, crypto/evp/evp_err.c, include/openssl/evperr.h.
        - CVE-2021-23840
      * SECURITY UPDATE: Null pointer deref in X509_issuer_and_serial_hash()
        - debian/patches/CVE-2021-23841.patch: fix Null pointer deref in
          crypto/x509/x509_cmp.c.
        - CVE-2021-23841
    
     -- Marc Deslauriers <email address hidden>  Wed, 17 Feb 2021 07:35:54 -0500
  • openssl (1.1.1f-1ubuntu2.1) focal-security; urgency=medium
    
      * SECURITY UPDATE: EDIPARTYNAME NULL pointer de-ref
        - debian/patches/CVE-2020-1971-1.patch: use explicit tagging for
          DirectoryString in crypto/x509v3/v3_genn.c.
        - debian/patches/CVE-2020-1971-2.patch: correctly compare EdiPartyName
          in crypto/x509v3/v3_genn.c.
        - debian/patches/CVE-2020-1971-3.patch: check that multi-strings/CHOICE
          types don't use implicit tagging in crypto/asn1/asn1_err.c,
          crypto/asn1/tasn_dec.c, crypto/err/openssl.txt,
          include/openssl/asn1err.h.
        - debian/patches/CVE-2020-1971-4.patch: complain if we are attempting
          to encode with an invalid ASN.1 template in crypto/asn1/asn1_err.c,
          crypto/asn1/tasn_enc.c, crypto/err/openssl.txt,
          include/openssl/asn1err.h.
        - debian/patches/CVE-2020-1971-5.patch: add a test for GENERAL_NAME_cmp
          in test/v3nametest.c.
        - debian/patches/CVE-2020-1971-6.patch: add a test for
          encoding/decoding using an invalid ASN.1 Template in
          test/asn1_decode_test.c, test/asn1_encode_test.c.
        - CVE-2020-1971
    
     -- Marc Deslauriers <email address hidden>  Wed, 02 Dec 2020 09:52:44 -0500
  • openssl (1.1.1f-1ubuntu2) focal; urgency=medium
    
      * SECURITY UPDATE: Segmentation fault in SSL_check_chain
        - debian/patches/CVE-2020-1967-1.patch: add test for CVE-2020-1967 in
          test/recipes/70-test_sslsigalgs.t.
        - debian/patches/CVE-2020-1967-2.patch: fix NULL dereference in
          SSL_check_chain() for TLS 1.3 in ssl/t1_lib.c.
        - debian/patches/CVE-2020-1967-3.patch: fix test in
          test/recipes/70-test_sslsigalgs.t.
        - debian/patches/CVE-2020-1967-4.patch: fix test in
          test/recipes/70-test_sslsigalgs.t.
        - CVE-2020-1967
    
     -- Marc Deslauriers <email address hidden>  Mon, 20 Apr 2020 07:53:50 -0400
  • openssl (1.1.1f-1ubuntu1) focal; urgency=low
    
      * Merge from Debian unstable.  Remaining changes:
        - Replace duplicate files in the doc directory with symlinks.
        - debian/libssl1.1.postinst:
          + Display a system restart required notification on libssl1.1
            upgrade on servers.
          + Use a different priority for libssl1.1/restart-services depending
            on whether a desktop, or server dist-upgrade is being performed.
          + Bump version check to to 1.1.1.
          + Import libraries/restart-without-asking template as used by above.
        - Revert "Enable system default config to enforce TLS1.2 as a
          minimum" & "Increase default security level from 1 to 2".
        - Reword the NEWS entry, as applicable on Ubuntu.
        - Cherrypick s390x SIMD acceleration patches for poly1305 and chacha20
          and ECC from master.
        - Use perl:native in the autopkgtest for installability on i386.
        - Set OPENSSL_TLS_SECURITY_LEVEL=2 as compiled-in minimum security
          level. Change meaning of SECURITY_LEVEL=2 to prohibit TLS versions
          below 1.2 and update documentation. Previous default of 1, can be set
          by calling SSL_CTX_set_security_level(), SSL_set_security_level() or
          using ':@SECLEVEL=1' CipherString value in openssl.cfg.
    
    openssl (1.1.1f-1) unstable; urgency=medium
    
      * New upstream version
       - Revert the change of EOF detection to avoid regressions in applications.
         (Closes: #955442).
    
    openssl (1.1.1e-1) unstable; urgency=medium
    
      * Use dh-compat level 12.
      * New upstream version
        - CVE-2019-1551 (Overflow in the x64_64 Montgomery squaring procedure),
        (Closes: #947949).
      * Update symbol list.
      * Update Standards-Version to 4.5.0. No changes required.
      * Add musl configurations (Closes: #941765).
    
     -- Dimitri John Ledkov <email address hidden>  Fri, 03 Apr 2020 18:31:00 +0100
  • openssl (1.1.1d-2ubuntu6) focal; urgency=medium
    
      * Revert version number change to 1.1.1e-dev.
    
    openssl (1.1.1d-2ubuntu4) focal; urgency=medium
    
      * Apply 1_1_1-stable branch patches
      * Apply s390x ECC assembly pack improvements
    
     -- Dimitri John Ledkov <email address hidden>  Fri, 06 Mar 2020 04:08:51 +0000
  • openssl (1.1.1d-2ubuntu5) focal; urgency=medium
    
      * Revert version number change to 1.1.1e-dev.
    
    openssl (1.1.1d-2ubuntu4) focal; urgency=medium
    
      * Apply 1_1_1-stable branch patches
      * Apply s390x ECC assembly pack improvements
    
     -- Dimitri John Ledkov <email address hidden>  Fri, 06 Mar 2020 04:08:51 +0000
  • openssl (1.1.1d-2ubuntu4) focal; urgency=medium
    
      * Apply 1_1_1-stable branch patches
      * Apply s390x ECC assembly pack improvements
    
     -- Dimitri John Ledkov <email address hidden>  Wed, 26 Feb 2020 21:54:47 +0000
  • openssl (1.1.1d-2ubuntu3) focal; urgency=medium
    
      * Use perl:native in the autopkgtest for installability on i386.
    
    openssl (1.1.1d-2ubuntu2) focal; urgency=low
    
      * Merge from Debian unstable.  Remaining changes:
        - Replace duplicate files in the doc directory with symlinks.
        - debian/libssl1.1.postinst:
          + Display a system restart required notification on libssl1.1
            upgrade on servers.
          + Use a different priority for libssl1.1/restart-services depending
            on whether a desktop, or server dist-upgrade is being performed.
          + Bump version check to to 1.1.1.
          + Import libraries/restart-without-asking template as used by above.
        - Revert "Enable system default config to enforce TLS1.2 as a
          minimum" & "Increase default security level from 1 to 2".
        - Reword the NEWS entry, as applicable on Ubuntu.
        - Cherrypick s390x SIMD acceleration patches for poly1305 and chacha20
          from master.
    
      * Set OPENSSL_TLS_SECURITY_LEVEL=2 as compiled-in minimum security
        level. Change meaning of SECURITY_LEVEL=2 to prohibit TLS versions
        below 1.2 and update documentation. Previous default of 1, can be set
        by calling SSL_CTX_set_security_level(), SSL_set_security_level() or
        using ':@SECLEVEL=1' CipherString value in openssl.cfg.
    
    openssl (1.1.1d-2) unstable; urgency=medium
    
      * Reenable AES-CBC-HMAC-SHA ciphers (Closes: #941987).
    
    openssl (1.1.1d-1) unstable; urgency=medium
    
      * New upstream version
       - CVE-2019-1549 (Fixed a fork protection issue).
       - CVE-2019-1547 (Compute ECC cofactors if not provided during EC_GROUP
         construction).
       - CVE-2019-1563 (Fixed a padding oracle in PKCS7_dataDecode and
         CMS_decrypt_set1_pkey).
      * Update symbol list
    
     -- Dimitri John Ledkov <email address hidden>  Thu, 16 Jan 2020 14:15:26 +0000
  • openssl (1.1.1d-2ubuntu2) focal; urgency=low
    
      * Merge from Debian unstable.  Remaining changes:
        - Replace duplicate files in the doc directory with symlinks.
        - debian/libssl1.1.postinst:
          + Display a system restart required notification on libssl1.1
            upgrade on servers.
          + Use a different priority for libssl1.1/restart-services depending
            on whether a desktop, or server dist-upgrade is being performed.
          + Bump version check to to 1.1.1.
          + Import libraries/restart-without-asking template as used by above.
        - Revert "Enable system default config to enforce TLS1.2 as a
          minimum" & "Increase default security level from 1 to 2".
        - Reword the NEWS entry, as applicable on Ubuntu.
        - Cherrypick s390x SIMD acceleration patches for poly1305 and chacha20
          from master.
    
      * Set OPENSSL_TLS_SECURITY_LEVEL=2 as compiled-in minimum security
        level. Change meaning of SECURITY_LEVEL=2 to prohibit TLS versions
        below 1.2 and update documentation. Previous default of 1, can be set
        by calling SSL_CTX_set_security_level(), SSL_set_security_level() or
        using ':@SECLEVEL=1' CipherString value in openssl.cfg.
    
     -- Dimitri John Ledkov <email address hidden>  Wed, 08 Jan 2020 17:17:41 +0000
  • openssl (1.1.1d-2ubuntu1) focal; urgency=low
    
      * Merge from Debian unstable.  Remaining changes:
        - Replace duplicate files in the doc directory with symlinks.
        - debian/libssl1.1.postinst:
          + Display a system restart required notification on libssl1.1
            upgrade on servers.
          + Use a different priority for libssl1.1/restart-services depending
            on whether a desktop, or server dist-upgrade is being performed.
          + Bump version check to to 1.1.1.
          + Import libraries/restart-without-asking template as used by above.
        - Revert "Enable system default config to enforce TLS1.2 as a
          minimum" & "Increase default security level from 1 to 2".
        - Reword the NEWS entry, as applicable on Ubuntu.
        - Cherrypick s390x SIMD acceleration patches for poly1305 and chacha20
          from master.
    
      * Set TLS 1.2 as compiled-in minimum protocol version for TLS
        context. TLS 1.0 and 1.1 can be enabled again by calling
        SSL_CTX_set_min_proto_version() or SSL_set_min_proto_version(), or
        setting MinProtocol in the openssl.cfg. LP: #1856428
    
      * Set OPENSSL_TLS_SECURITY_LEVEL=2 as compiled-in minimum security
        level. Previous default of 1, can be set by calling
        SSL_CTX_set_security_level(), SSL_set_security_level() or using
        ':@SECLEVEL=1' CipherString value in openssl.cfg.
    
    openssl (1.1.1d-2) unstable; urgency=medium
    
      * Reenable AES-CBC-HMAC-SHA ciphers (Closes: #941987).
    
    openssl (1.1.1d-1) unstable; urgency=medium
    
      * New upstream version
       - CVE-2019-1549 (Fixed a fork protection issue).
       - CVE-2019-1547 (Compute ECC cofactors if not provided during EC_GROUP
         construction).
       - CVE-2019-1563 (Fixed a padding oracle in PKCS7_dataDecode and
         CMS_decrypt_set1_pkey).
      * Update symbol list
    
     -- Dimitri John Ledkov <email address hidden>  Wed, 08 Jan 2020 17:17:41 +0000
  • openssl (1.1.1c-1ubuntu4) eoan; urgency=medium
    
      * Cherrypick s390x SIMD acceleration patches for poly1305 and chacha20
        from master. LP: #1736705 LP: #1736704
    
     -- Dimitri John Ledkov <email address hidden>  Tue, 20 Aug 2019 12:46:33 +0100