Change logs for openssl source package in Quantal

  • openssl (1.0.1c-3ubuntu2.8) quantal-security; urgency=medium
    
      * SECURITY UPDATE: denial of service via use after free
        - debian/patches/CVE-2010-5298.patch: check s->s3->rbuf.left before
          releasing buffers in ssl/s3_pkt.c.
        - CVE-2010-5298
      * SECURITY UPDATE: denial of service via null pointer dereference
        - debian/patches/CVE-2014-0198.patch: if buffer was released, get a new
          one in ssl/s3_pkt.c.
        - CVE-2014-0198
     -- Marc Deslauriers <email address hidden>   Fri, 02 May 2014 15:27:44 -0400
  • openssl (1.0.1c-3ubuntu2.7) quantal-security; urgency=medium
    
      * SECURITY UPDATE: side-channel attack on Montgomery ladder implementation
        - debian/patches/CVE-2014-0076.patch: add and use constant time swap in
          crypto/bn/bn.h, crypto/bn/bn_lib.c, crypto/ec/ec2_mult.c,
          util/libeay.num.
        - CVE-2014-0076
      * SECURITY UPDATE: memory disclosure in TLS heartbeat extension
        - debian/patches/CVE-2014-0160.patch: use correct lengths in
          ssl/d1_both.c, ssl/t1_lib.c.
        - CVE-2014-0160
     -- Marc Deslauriers <email address hidden>   Mon, 07 Apr 2014 15:44:36 -0400
  • openssl (1.0.1c-3ubuntu2.6) quantal-security; urgency=low
    
      * SECURITY UPDATE: denial of service via invalid TLS handshake
        - debian/patches/CVE-2013-4353.patch: handle no new cipher setup in
          ssl/s3_both.c.
        - CVE-2013-4353
      * SECURITY UPDATE: denial of service via incorrect data structure
        - debian/patches/CVE-2013-6449.patch: check for handshake digests in
          ssl/s3_both.c,ssl/s3_pkt.c,ssl/t1_enc.c, use proper version in
          ssl/s3_lib.c.
        - CVE-2013-6449
      * SECURITY UPDATE: denial of service via DTLS retransmission
        - debian/patches/CVE-2013-6450.patch: fix DTLS retransmission in
          crypto/evp/digest.c,ssl/d1_both.c,ssl/s3_pkt.c,ssl/s3_srvr.c,
          ssl/ssl_locl.h,ssl/t1_enc.c.
        - CVE-2013-6450
      * debian/patches/no_default_rdrand.patch: Don't use rdrand engine as
        default unless explicitly requested.
     -- Marc Deslauriers <email address hidden>   Wed, 08 Jan 2014 14:58:35 -0500
  • openssl (1.0.1c-3ubuntu2.5) quantal-security; urgency=low
    
      * SECURITY UPDATE: Disable compression to avoid CRIME systemwide
        (LP: #1187195)
        - CVE-2012-4929
        - debian/patches/openssl-1.0.1e-env-zlib.patch: disable default use of
          zlib to compress SSL/TLS unless the environment variable
          OPENSSL_DEFAULT_ZLIB is set in the environment during library
          initialization.
        - Introduced to assist with programs not yet updated to provide their own
          controls on compression, such as Postfix
        - http://pkgs.fedoraproject.org/cgit/openssl.git/plain/openssl-1.0.1e-env-zlib.patch
     -- Seth Arnold <email address hidden>   Mon, 03 Jun 2013 18:13:33 -0700
  • openssl (1.0.1c-3ubuntu2.4) quantal; urgency=low
    
      [ Dmitrijs Ledkovs ]
      * Enable arm assembly code. (LP: #1083498) (Closes: #676533)
      * Enable optimized 64bit elliptic curve code contributed by Google. (LP: #1018522)
    
      [ Marc Deslauriers ]
      * debian/patches/fix_key_decoding_deadlock.patch: Fix possible deadlock
        when decoding public keys. (LP: #1066032)
     -- Dmitrijs Ledkovs <email address hidden>   Thu, 04 Apr 2013 12:15:11 +0100
  • openssl (1.0.1c-3ubuntu2.3) quantal-security; urgency=low
    
      * SECURITY UPDATE: "Lucky Thirteen" timing side-channel TLS attack
        - debian/patches/CVE-2013-0169.patch: re-enabled patch and added extra
          commit from upstream to fix regression.
        - CVE-2013-0169
     -- Marc Deslauriers <email address hidden>   Tue, 19 Mar 2013 14:35:24 -0400
  • openssl (1.0.1c-3ubuntu2.2) quantal-security; urgency=low
    
      * REGRESSION FIX: decryption errors on AES-NI hardware (LP: #1134873,
        LP: #1133333)
        - debian/patches/CVE-2013-0169.patch: disabled for now until fix is
          available from upstream.
     -- Marc Deslauriers <email address hidden>   Thu, 28 Feb 2013 10:56:42 -0500
  • openssl (1.0.1c-3ubuntu2.1) quantal-security; urgency=low
    
      * SECURITY UPDATE: denial of service via invalid OCSP key
        - debian/patches/CVE-2013-0166.patch: properly handle NULL key in
          crypto/asn1/a_verify.c, crypto/ocsp/ocsp_vfy.c.
        - CVE-2013-0166
      * SECURITY UPDATE: "Lucky Thirteen" timing side-channel TLS attack
        - debian/patches/CVE-2013-0169.patch: massive code changes
        - CVE-2013-0169
      * SECURITY UPDATE: denial of service via AES-NI and crafted CBC data
        - Fix included in CVE-2013-0169 patch
        - CVE-2012-2686
     -- Marc Deslauriers <email address hidden>   Mon, 18 Feb 2013 13:13:42 -0500
  • openssl (1.0.1c-3ubuntu2) quantal; urgency=low
    
      [ Tyler Hicks <email address hidden> ]
      * debian/patches/tls12_workarounds.patch: Readd the change to check
        TLS1_get_client_version rather than TLS1_get_version to fix incorrect
        client hello cipher list truncation when TLS 1.1 and lower is in use.
        (LP: #1051892)
    
      [ Micah Gersten <email address hidden> ]
      * Mark Debian Vcs-* as XS-Debian-Vcs-*
        - update debian/control
     -- Tyler Hicks <email address hidden>   Thu, 04 Oct 2012 10:34:57 -0700
  • openssl (1.0.1c-3ubuntu1) quantal; urgency=low
    
      * Resynchronise with Debian. Remaining changes:
        - debian/libssl1.0.0.postinst:
          + Display a system restart required notification on libssl1.0.0
            upgrade on servers.
          + Use a different priority for libssl1.0.0/restart-services depending
            on whether a desktop, or server dist-upgrade is being performed.
        - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
          libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
          in Debian).
        - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
          rules}: Move runtime libraries to /lib, for the benefit of
          wpasupplicant.
        - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
          .pc.
        - debian/rules:
          + Don't run 'make test' when cross-building.
          + Use host compiler when cross-building.  Patch from Neil Williams.
          + Don't build for processors no longer supported: i586 (on i386)
          + Fix Makefile to properly clean up libs/ dirs in clean target.
          + Replace duplicate files in the doc directory with symlinks.
        - Unapply patch c_rehash-multi and comment it out in the series as it
          breaks parsing of certificates with CRLF line endings and other cases
          (see Debian #642314 for discussion), it also changes the semantics of
          c_rehash directories by requiring applications to parse hash link
          targets as files containing potentially *multiple* certificates rather
          than exactly one.
        - Bump version passed to dh_makeshlibs to 1.0.1 for new symbols.
        - debian/patches/tls12_workarounds.patch: workaround large client hello
          issue: Compile with -DOPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50 and
          with -DOPENSSL_NO_TLS1_2_CLIENT.
      * Dropped upstreamed patches:
        - debian/patches/CVE-2012-2110.patch
        - debian/patches/CVE-2012-2110b.patch
        - debian/patches/CVE-2012-2333.patch
        - debian/patches/CVE-2012-0884-extra.patch
        - most of debian/patches/tls12_workarounds.patch
    
    openssl (1.0.1c-3) unstable; urgency=low
    
      * Disable padlock engine again, causes problems for hosts not supporting it.
    
    openssl (1.0.1c-2) unstable; urgency=high
    
      * Fix renegiotation when using TLS > 1.0.  This breaks tor.  Patch from
        upstream.  (Closes: #675990)
      * Enable the padlock engine by default.
      * Change default bits from 1024 to 2048 (Closes: #487152)
    
    openssl (1.0.1c-1) unstable; urgency=high
    
      * New upstream version
        - Fixes CVE-2012-2333 (Closes: #672452)
    
    openssl (1.0.1b-1) unstable; urgency=high
    
      * New upstream version
        - Remaps SSL_OP_NO_TLSv1_1, so applications linked to 1.0.0
          can talk to servers supporting TLS 1.1 but not TLS 1.2
        - Drop rc4_hmac_md5.patch, applied upstream
    
    openssl (1.0.1a-3) unstable; urgency=low
    
      * Use patch from upstream for the rc4_hmac_md5 issue.
    
    openssl (1.0.1a-2) unstable; urgency=low
    
      * Fix rc4_hmac_md5 on non-i386/amd64 arches.
    
    openssl (1.0.1a-1) unstable; urgency=high
    
      * New upstream version
        - Fixes CVE-2012-2110
        - Fix crash in rc4_hmac_md5 (Closes: #666405)
        - Fixes some issues with talking to other servers when TLS 1.1 and 1.2 is
          supported
        - Drop patches no_ssl2.patch vpaes.patch tls1.2_client_algorithms.patch,
          applied upstream.
     -- Marc Deslauriers <email address hidden>   Fri, 29 Jun 2012 13:01:30 -0400
  • openssl (1.0.1-4ubuntu6) quantal; urgency=low
    
      * SECURITY UPDATE: denial of service attack in DTLS, TLS v1.1 and
        TLS v1.2 implementation
        - debian/patches/CVE_2012-2333.patch: guard for integer overflow
          before skipping explicit IV
        - CVE-2012-2333
      * debian/patches/CVE-2012-0884-extra.patch: initialize tkeylen
        properly when encrypting CMS messages.
     -- Steve Beattie <email address hidden>   Thu, 24 May 2012 16:05:04 -0700
  • openssl (1.0.1-4ubuntu5) precise-proposed; urgency=low
    
      * debian/patches/CVE-2012-2110b.patch: Use correct error code in
        BUF_MEM_grow_clean()
    
    openssl (1.0.1-4ubuntu4) precise-proposed; urgency=low
    
      * Check TLS1_get_client_version rather than TLS1_get_version for client
        hello cipher list truncation, in a further attempt to get things working
        again for everyone (LP: #986147).
     -- Jamie Strandboge <email address hidden>   Tue, 24 Apr 2012 08:29:32 -0500
  • openssl (1.0.1-4ubuntu3) precise-proposed; urgency=low
    
      * SECURITY UPDATE: fix various overflows
        - debian/patches/CVE-2012-2110.patch: adjust crypto/a_d2i_fp.c,
          crypto/buffer.c and crypto/mem.c to verify size of lengths
        - CVE-2012-2110
     -- Jamie Strandboge <email address hidden>   Thu, 19 Apr 2012 10:31:06 -0500