-
openssl (1.0.1c-3ubuntu2.8) quantal-security; urgency=medium
* SECURITY UPDATE: denial of service via use after free
- debian/patches/CVE-2010-5298.patch: check s->s3->rbuf.left before
releasing buffers in ssl/s3_pkt.c.
- CVE-2010-5298
* SECURITY UPDATE: denial of service via null pointer dereference
- debian/patches/CVE-2014-0198.patch: if buffer was released, get a new
one in ssl/s3_pkt.c.
- CVE-2014-0198
-- Marc Deslauriers <email address hidden> Fri, 02 May 2014 15:27:44 -0400
-
openssl (1.0.1c-3ubuntu2.7) quantal-security; urgency=medium
* SECURITY UPDATE: side-channel attack on Montgomery ladder implementation
- debian/patches/CVE-2014-0076.patch: add and use constant time swap in
crypto/bn/bn.h, crypto/bn/bn_lib.c, crypto/ec/ec2_mult.c,
util/libeay.num.
- CVE-2014-0076
* SECURITY UPDATE: memory disclosure in TLS heartbeat extension
- debian/patches/CVE-2014-0160.patch: use correct lengths in
ssl/d1_both.c, ssl/t1_lib.c.
- CVE-2014-0160
-- Marc Deslauriers <email address hidden> Mon, 07 Apr 2014 15:44:36 -0400
-
openssl (1.0.1c-3ubuntu2.6) quantal-security; urgency=low
* SECURITY UPDATE: denial of service via invalid TLS handshake
- debian/patches/CVE-2013-4353.patch: handle no new cipher setup in
ssl/s3_both.c.
- CVE-2013-4353
* SECURITY UPDATE: denial of service via incorrect data structure
- debian/patches/CVE-2013-6449.patch: check for handshake digests in
ssl/s3_both.c,ssl/s3_pkt.c,ssl/t1_enc.c, use proper version in
ssl/s3_lib.c.
- CVE-2013-6449
* SECURITY UPDATE: denial of service via DTLS retransmission
- debian/patches/CVE-2013-6450.patch: fix DTLS retransmission in
crypto/evp/digest.c,ssl/d1_both.c,ssl/s3_pkt.c,ssl/s3_srvr.c,
ssl/ssl_locl.h,ssl/t1_enc.c.
- CVE-2013-6450
* debian/patches/no_default_rdrand.patch: Don't use rdrand engine as
default unless explicitly requested.
-- Marc Deslauriers <email address hidden> Wed, 08 Jan 2014 14:58:35 -0500
-
openssl (1.0.1c-3ubuntu2.5) quantal-security; urgency=low
* SECURITY UPDATE: Disable compression to avoid CRIME systemwide
(LP: #1187195)
- CVE-2012-4929
- debian/patches/openssl-1.0.1e-env-zlib.patch: disable default use of
zlib to compress SSL/TLS unless the environment variable
OPENSSL_DEFAULT_ZLIB is set in the environment during library
initialization.
- Introduced to assist with programs not yet updated to provide their own
controls on compression, such as Postfix
- http://pkgs.fedoraproject.org/cgit/openssl.git/plain/openssl-1.0.1e-env-zlib.patch
-- Seth Arnold <email address hidden> Mon, 03 Jun 2013 18:13:33 -0700
-
openssl (1.0.1c-3ubuntu2.4) quantal; urgency=low
[ Dmitrijs Ledkovs ]
* Enable arm assembly code. (LP: #1083498) (Closes: #676533)
* Enable optimized 64bit elliptic curve code contributed by Google. (LP: #1018522)
[ Marc Deslauriers ]
* debian/patches/fix_key_decoding_deadlock.patch: Fix possible deadlock
when decoding public keys. (LP: #1066032)
-- Dmitrijs Ledkovs <email address hidden> Thu, 04 Apr 2013 12:15:11 +0100
-
openssl (1.0.1c-3ubuntu2.3) quantal-security; urgency=low
* SECURITY UPDATE: "Lucky Thirteen" timing side-channel TLS attack
- debian/patches/CVE-2013-0169.patch: re-enabled patch and added extra
commit from upstream to fix regression.
- CVE-2013-0169
-- Marc Deslauriers <email address hidden> Tue, 19 Mar 2013 14:35:24 -0400
-
openssl (1.0.1c-3ubuntu2.2) quantal-security; urgency=low
* REGRESSION FIX: decryption errors on AES-NI hardware (LP: #1134873,
LP: #1133333)
- debian/patches/CVE-2013-0169.patch: disabled for now until fix is
available from upstream.
-- Marc Deslauriers <email address hidden> Thu, 28 Feb 2013 10:56:42 -0500
-
openssl (1.0.1c-3ubuntu2.1) quantal-security; urgency=low
* SECURITY UPDATE: denial of service via invalid OCSP key
- debian/patches/CVE-2013-0166.patch: properly handle NULL key in
crypto/asn1/a_verify.c, crypto/ocsp/ocsp_vfy.c.
- CVE-2013-0166
* SECURITY UPDATE: "Lucky Thirteen" timing side-channel TLS attack
- debian/patches/CVE-2013-0169.patch: massive code changes
- CVE-2013-0169
* SECURITY UPDATE: denial of service via AES-NI and crafted CBC data
- Fix included in CVE-2013-0169 patch
- CVE-2012-2686
-- Marc Deslauriers <email address hidden> Mon, 18 Feb 2013 13:13:42 -0500
-
openssl (1.0.1c-3ubuntu2) quantal; urgency=low
[ Tyler Hicks <email address hidden> ]
* debian/patches/tls12_workarounds.patch: Readd the change to check
TLS1_get_client_version rather than TLS1_get_version to fix incorrect
client hello cipher list truncation when TLS 1.1 and lower is in use.
(LP: #1051892)
[ Micah Gersten <email address hidden> ]
* Mark Debian Vcs-* as XS-Debian-Vcs-*
- update debian/control
-- Tyler Hicks <email address hidden> Thu, 04 Oct 2012 10:34:57 -0700
-
openssl (1.0.1c-3ubuntu1) quantal; urgency=low
* Resynchronise with Debian. Remaining changes:
- debian/libssl1.0.0.postinst:
+ Display a system restart required notification on libssl1.0.0
upgrade on servers.
+ Use a different priority for libssl1.0.0/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
- debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
in Debian).
- debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
rules}: Move runtime libraries to /lib, for the benefit of
wpasupplicant.
- debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
.pc.
- debian/rules:
+ Don't run 'make test' when cross-building.
+ Use host compiler when cross-building. Patch from Neil Williams.
+ Don't build for processors no longer supported: i586 (on i386)
+ Fix Makefile to properly clean up libs/ dirs in clean target.
+ Replace duplicate files in the doc directory with symlinks.
- Unapply patch c_rehash-multi and comment it out in the series as it
breaks parsing of certificates with CRLF line endings and other cases
(see Debian #642314 for discussion), it also changes the semantics of
c_rehash directories by requiring applications to parse hash link
targets as files containing potentially *multiple* certificates rather
than exactly one.
- Bump version passed to dh_makeshlibs to 1.0.1 for new symbols.
- debian/patches/tls12_workarounds.patch: workaround large client hello
issue: Compile with -DOPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50 and
with -DOPENSSL_NO_TLS1_2_CLIENT.
* Dropped upstreamed patches:
- debian/patches/CVE-2012-2110.patch
- debian/patches/CVE-2012-2110b.patch
- debian/patches/CVE-2012-2333.patch
- debian/patches/CVE-2012-0884-extra.patch
- most of debian/patches/tls12_workarounds.patch
openssl (1.0.1c-3) unstable; urgency=low
* Disable padlock engine again, causes problems for hosts not supporting it.
openssl (1.0.1c-2) unstable; urgency=high
* Fix renegiotation when using TLS > 1.0. This breaks tor. Patch from
upstream. (Closes: #675990)
* Enable the padlock engine by default.
* Change default bits from 1024 to 2048 (Closes: #487152)
openssl (1.0.1c-1) unstable; urgency=high
* New upstream version
- Fixes CVE-2012-2333 (Closes: #672452)
openssl (1.0.1b-1) unstable; urgency=high
* New upstream version
- Remaps SSL_OP_NO_TLSv1_1, so applications linked to 1.0.0
can talk to servers supporting TLS 1.1 but not TLS 1.2
- Drop rc4_hmac_md5.patch, applied upstream
openssl (1.0.1a-3) unstable; urgency=low
* Use patch from upstream for the rc4_hmac_md5 issue.
openssl (1.0.1a-2) unstable; urgency=low
* Fix rc4_hmac_md5 on non-i386/amd64 arches.
openssl (1.0.1a-1) unstable; urgency=high
* New upstream version
- Fixes CVE-2012-2110
- Fix crash in rc4_hmac_md5 (Closes: #666405)
- Fixes some issues with talking to other servers when TLS 1.1 and 1.2 is
supported
- Drop patches no_ssl2.patch vpaes.patch tls1.2_client_algorithms.patch,
applied upstream.
-- Marc Deslauriers <email address hidden> Fri, 29 Jun 2012 13:01:30 -0400
-
openssl (1.0.1-4ubuntu6) quantal; urgency=low
* SECURITY UPDATE: denial of service attack in DTLS, TLS v1.1 and
TLS v1.2 implementation
- debian/patches/CVE_2012-2333.patch: guard for integer overflow
before skipping explicit IV
- CVE-2012-2333
* debian/patches/CVE-2012-0884-extra.patch: initialize tkeylen
properly when encrypting CMS messages.
-- Steve Beattie <email address hidden> Thu, 24 May 2012 16:05:04 -0700
-
openssl (1.0.1-4ubuntu5) precise-proposed; urgency=low
* debian/patches/CVE-2012-2110b.patch: Use correct error code in
BUF_MEM_grow_clean()
openssl (1.0.1-4ubuntu4) precise-proposed; urgency=low
* Check TLS1_get_client_version rather than TLS1_get_version for client
hello cipher list truncation, in a further attempt to get things working
again for everyone (LP: #986147).
-- Jamie Strandboge <email address hidden> Tue, 24 Apr 2012 08:29:32 -0500
-
openssl (1.0.1-4ubuntu3) precise-proposed; urgency=low
* SECURITY UPDATE: fix various overflows
- debian/patches/CVE-2012-2110.patch: adjust crypto/a_d2i_fp.c,
crypto/buffer.c and crypto/mem.c to verify size of lengths
- CVE-2012-2110
-- Jamie Strandboge <email address hidden> Thu, 19 Apr 2012 10:31:06 -0500