Change logs for openssl source package in Xenial

  • openssl (1.0.2g-1ubuntu4.20) xenial-security; urgency=medium
    
      * Enable X509_V_FLAG_TRUSTED_FIRST by default, such that letsencrypt
        connection with the default chain remains trusted even after the
        expiry of the redundant CA certificate. LP: #1928989
    
     -- Dimitri John Ledkov <email address hidden>  Mon, 28 Jun 2021 14:05:36 +0100
  • openssl (1.0.2g-1ubuntu4.19) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Integer overflow in CipherUpdate
        - debian/patches/CVE-2021-23840-pre1.patch: add new EVP error codes in
          crypto/evp/evp_err.c, crypto/evp/evp.h.
        - debian/patches/CVE-2021-23840-pre2.patch: add a new EVP error code in
          crypto/evp/evp_err.c, crypto/evp/evp.h.
        - debian/patches/CVE-2021-23840.patch: don't overflow the output length
          in EVP_CipherUpdate calls in crypto/evp/evp_enc.c,
          crypto/evp/evp_err.c, crypto/evp/evp.h.
        - CVE-2021-23840
      * SECURITY UPDATE: Null pointer deref in X509_issuer_and_serial_hash()
        - debian/patches/CVE-2021-23841.patch: fix Null pointer deref in
          crypto/x509/x509_cmp.c.
        - CVE-2021-23841
    
     -- Marc Deslauriers <email address hidden>  Wed, 17 Feb 2021 08:14:40 -0500
  • openssl (1.0.2g-1ubuntu4.18) xenial-security; urgency=medium
    
      * SECURITY UPDATE: EDIPARTYNAME NULL pointer de-ref
        - debian/patches/CVE-2020-1971-1.patch: use explicit tagging for
          DirectoryString in crypto/x509v3/v3_genn.c.
        - debian/patches/CVE-2020-1971-2.patch: correctly compare EdiPartyName
          in crypto/x509v3/v3_genn.c.
        - debian/patches/CVE-2020-1971-3.patch: check that multi-strings/CHOICE
          types don't use implicit tagging in crypto/asn1/asn1_err.c,
          crypto/asn1/tasn_dec.c, crypto/asn1/asn1.h.
        - debian/patches/CVE-2020-1971-4.patch: complain if we are attempting
          to encode with an invalid ASN.1 template in crypto/asn1/asn1_err.c,
          crypto/asn1/tasn_enc.c, crypto/asn1/asn1.h.
        - debian/patches/CVE-2020-1971-5.patch: add a test for GENERAL_NAME_cmp
          in crypto/x509v3/v3nametest.c.
        - CVE-2020-1971
    
     -- Marc Deslauriers <email address hidden>  Wed, 02 Dec 2020 10:43:58 -0500
  • openssl (1.0.2g-1ubuntu4.17) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Raccoon Attack
        - debian/patches/CVE-2020-1968.patch: disable ciphers that reuse the
          DH secret across multiple TLS connections in ssl/s3_lib.c.
        - CVE-2020-1968
    
     -- Marc Deslauriers <email address hidden>  Tue, 15 Sep 2020 14:13:51 -0400
  • openssl (1.0.2g-1ubuntu4.16) xenial-security; urgency=medium
    
      * SECURITY UPDATE: ECDSA remote timing attack
        - debian/patches/CVE-2019-1547.patch: for ECC parameters with NULL or
          zero cofactor, compute it in crypto/ec/ec.h, crypto/ec/ec_err.c,
          crypto/ec/ec_lib.c.
        - CVE-2019-1547
      * SECURITY UPDATE: rsaz_512_sqr overflow bug on x86_64
        - debian/patches/CVE-2019-1551.patch: fix an overflow bug in
          rsaz_512_sqr in crypto/bn/asm/rsaz-x86_64.pl.
        - CVE-2019-1551
      * SECURITY UPDATE: Padding Oracle issue
        - debian/patches/CVE-2019-1563.patch: fix a padding oracle in
          PKCS7_dataDecode and CMS_decrypt_set1_pkey in crypto/cms/cms_env.c,
          crypto/cms/cms_lcl.h, crypto/cms/cms_smime.c,
          crypto/pkcs7/pk7_doit.c.
        - CVE-2019-1563
    
     -- Marc Deslauriers <email address hidden>  Wed, 27 May 2020 15:17:49 -0400
  • openssl (1.0.2g-1ubuntu4.15) xenial-security; urgency=medium
    
      * SECURITY UPDATE: 0-byte record padding oracle
        - debian/patches/CVE-2019-1559.patch: go into the error state if a
          fatal alert is sent or received in ssl/d1_pkt.c, ssl/s3_pkt.c.
        - CVE-2019-1559
    
     -- Marc Deslauriers <email address hidden>  Tue, 26 Feb 2019 13:16:01 -0500
  • openssl (1.0.2g-1ubuntu4.14) xenial-security; urgency=medium
    
      * SECURITY UPDATE: PortSmash side channel attack
        - debian/patches/CVE-2018-5407.patch: fix timing vulnerability in
          crypto/bn/bn_lib.c, crypto/ec/ec_mult.c.
        - CVE-2018-5407
      * SECURITY UPDATE: timing side channel attack in DSA
        - debian/patches/CVE-2018-0734-pre1.patch: address a timing side
          channel in crypto/dsa/dsa_ossl.c.
        - debian/patches/CVE-2018-0734-1.patch: fix timing vulnerability in
          crypto/dsa/dsa_ossl.c.
        - debian/patches/CVE-2018-0734-2.patch: fix mod inverse in
          crypto/dsa/dsa_ossl.c.
        - debian/patches/CVE-2018-0734-3.patch: add a constant time flag in
          crypto/dsa/dsa_ossl.c.
        - CVE-2018-0734
    
     -- Marc Deslauriers <email address hidden>  Tue, 04 Dec 2018 08:38:18 -0500
  • openssl (1.0.2g-1ubuntu4.13) xenial-security; urgency=medium
    
      * SECURITY UPDATE: ECDSA key extraction side channel
        - debian/patches/CVE-2018-0495.patch: add blinding to an ECDSA
          signature in crypto/ecdsa/ecdsatest.c, crypto/ecdsa/ecs_ossl.c.
        - CVE-2018-0495
      * SECURITY UPDATE: denial of service via long prime values
        - debian/patches/CVE-2018-0732.patch: reject excessively large primes
          in DH key generation in crypto/dh/dh_key.c.
        - CVE-2018-0732
      * SECURITY UPDATE: RSA cache timing side channel attack
        (previous update was incomplete)
        - debian/patches/CVE-2018-0737-1.patch: replaced variable-time GCD in
          crypto/rsa/rsa_gen.c.
        - debian/patches/CVE-2018-0737-2.patch: used ERR set/pop mark in
          crypto/rsa/rsa_gen.c.
        - debian/patches/CVE-2018-0737-3.patch: consttime flag changed in
          crypto/rsa/rsa_gen.c.
        - debian/patches/CVE-2018-0737-4.patch: ensure BN_mod_inverse and
          BN_mod_exp_mont both get called with BN_FLG_CONSTTIME flag set in
          crypto/rsa/rsa_gen.c.
        - CVE-2018-0737
    
     -- Marc Deslauriers <email address hidden>  Wed, 20 Jun 2018 07:38:22 -0400
  • openssl (1.0.2g-1ubuntu4.12) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Cache timing side channel
        - debian/patches/CVE-2018-0737.patch: ensure BN_mod_inverse
          and BN_mod_exp_mont get called with BN_FLG_CONSTTIME flag set
          in crypto/rsa/rsa_gen.c.
        - CVE-2018-0737
    
     -- <email address hidden> (Leonidas S. Barbosa)  Wed, 18 Apr 2018 15:35:17 -0300
  • openssl (1.0.2g-1ubuntu4.11) xenial-security; urgency=medium
    
      * SECURITY UPDATE: DoS via ASN.1 types with a recursive definition
        - debian/patches/CVE-2018-0739.patch: limit stack depth in
          crypto/asn1/asn1.h, crypto/asn1/asn1_err.c, crypto/asn1/tasn_dec.c.
        - CVE-2018-0739
    
     -- Marc Deslauriers <email address hidden>  Tue, 27 Mar 2018 14:18:33 -0400
  • openssl (1.0.2g-1ubuntu4.10) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Read/write after SSL object in error state
        - debian/patches/CVE-2017-3737-pre.patch: add test/ssltestlib.*,
          add to test/Makefile.
        - debian/patches/CVE-2017-3737-1.patch: don't allow read/write after
          fatal error in ssl/ssl.h.
        - debian/patches/CVE-2017-3737-2.patch: add test to ssl/Makefile,
          ssl/fatalerrtest.c, test/Makefile.
        - CVE-2017-3737
      * SECURITY UPDATE: rsaz_1024_mul_avx2 overflow bug on x86_64
        - debian/patches/CVE-2017-3738.patch: fix digit correction bug in
          crypto/bn/asm/rsaz-avx2.pl.
        - CVE-2017-3738
    
     -- Marc Deslauriers <email address hidden>  Thu, 07 Dec 2017 13:17:37 -0500
  • openssl (1.0.2g-1ubuntu4.9) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Malformed X.509 IPAddressFamily could cause OOB read
        - debian/patches/CVE-2017-3735.patch: avoid out-of-bounds read in
          crypto/x509v3/v3_addr.c.
        - CVE-2017-3735
      * SECURITY UPDATE: bn_sqrx8x_internal carry bug on x86_64
        - debian/patches/CVE-2017-3736.patch: fix carry bug in
          bn_sqrx8x_internal in crypto/bn/asm/x86_64-mont5.pl.
        - CVE-2017-3736
    
     -- Marc Deslauriers <email address hidden>  Thu, 02 Nov 2017 11:28:46 -0400
  • openssl (1.0.2g-1ubuntu4.8) xenial; urgency=medium
    
      * aes/asm/aesni-sha*-x86_64.pl: fix IV handling in SHAEXT paths.
        (LP: #1674399)
    
     -- William Grant <email address hidden>  Fri, 19 May 2017 18:27:58 +1000
  • openssl (1.0.2g-1ubuntu4.7) xenial; urgency=medium
    
      * crypto/x86*cpuid.pl: move extended feature detection. (LP: #1674399)
        This fix moves extended feature detection past basic feature
        detection where it belongs. 32-bit counterpart is harmonized too.
    
     -- Eric Desrochers <email address hidden>  Wed, 26 Apr 2017 09:08:02 -0400
  • openssl (1.0.2g-1ubuntu4.6) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Montgomery multiplication may produce incorrect
        results
        - debian/patches/CVE-2016-7055.patch: fix logic in
          crypto/bn/asm/x86_64-mont.pl.
        - CVE-2016-7055
      * SECURITY UPDATE: DoS via warning alerts
        - debian/patches/CVE-2016-8610.patch: don't allow too many consecutive
          warning alerts in ssl/d1_pkt.c, ssl/s3_pkt.c, ssl/ssl.h,
          ssl/ssl_locl.h.
        - debian/patches/CVE-2016-8610-2.patch: fail if an unrecognised record
          type is received in ssl/s3_pkt.c.
        - CVE-2016-8610
      * SECURITY UPDATE: Truncated packet could crash via OOB read
        - debian/patches/CVE-2017-3731.patch: harden RC4_MD5 cipher in
          crypto/evp/e_rc4_hmac_md5.c.
        - CVE-2017-3731
      * SECURITY UPDATE: BN_mod_exp may produce incorrect results on x86_64
        - debian/patches/CVE-2017-3732.patch: fix carry bug in
          bn_sqr8x_internal in crypto/bn/asm/x86_64-mont5.pl.
        - CVE-2017-3732
    
     -- Marc Deslauriers <email address hidden>  Mon, 30 Jan 2017 10:31:12 -0500
  • openssl (1.0.2g-1ubuntu4.5) xenial-security; urgency=medium
    
      * SECURITY REGRESSION: incomplete fix for CVE-2016-2182 (LP: #1626883)
        - debian/patches/CVE-2016-2182-2.patch: fix off-by-one in overflow
          check in crypto/bn/bn_print.c.
    
     -- Marc Deslauriers <email address hidden>  Fri, 23 Sep 2016 08:00:13 -0400
  • openssl (1.0.2g-1ubuntu4.4) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Pointer arithmetic undefined behaviour
        - debian/patches/CVE-2016-2177.patch: avoid undefined pointer
          arithmetic in ssl/s3_srvr.c, ssl/ssl_sess.c, ssl/t1_lib.c.
        - CVE-2016-2177
      * SECURITY UPDATE: Constant time flag not preserved in DSA signing
        - debian/patches/CVE-2016-2178-*.patch: preserve BN_FLG_CONSTTIME in
          crypto/dsa/dsa_ossl.c.
        - CVE-2016-2178
      * SECURITY UPDATE: DTLS buffered message DoS
        - debian/patches/CVE-2016-2179.patch: fix queue handling in
          ssl/d1_both.c, ssl/d1_clnt.c, ssl/d1_lib.c, ssl/d1_srvr.c,
          ssl/ssl_locl.h.
        - CVE-2016-2179
      * SECURITY UPDATE: OOB read in TS_OBJ_print_bio()
        - debian/patches/CVE-2016-2180.patch: fix text handling in
          crypto/ts/ts_lib.c.
        - CVE-2016-2180
      * SECURITY UPDATE: DTLS replay protection DoS
        - debian/patches/CVE-2016-2181-1.patch: properly handle unprocessed
          records in ssl/d1_pkt.c.
        - debian/patches/CVE-2016-2181-2.patch: protect against replay attacks
          in ssl/d1_pkt.c, ssl/ssl.h, ssl/ssl_err.c.
        - debian/patches/CVE-2016-2181-3.patch: update error code in ssl/ssl.h.
        - CVE-2016-2181
      * SECURITY UPDATE: OOB write in BN_bn2dec()
        - debian/patches/CVE-2016-2182.patch: don't overflow buffer in
          crypto/bn/bn_print.c.
        - CVE-2016-2182
      * SECURITY UPDATE: SWEET32 Mitigation
        - debian/patches/CVE-2016-2183.patch: move DES ciphersuites from HIGH
          to MEDIUM in ssl/s3_lib.c.
        - CVE-2016-2183
      * SECURITY UPDATE: Malformed SHA512 ticket DoS
        - debian/patches/CVE-2016-6302.patch: sanity check ticket length in
          ssl/t1_lib.c.
        - CVE-2016-6302
      * SECURITY UPDATE: OOB write in MDC2_Update()
        - debian/patches/CVE-2016-6303.patch: avoid overflow in
          crypto/mdc2/mdc2dgst.c.
        - CVE-2016-6303
      * SECURITY UPDATE: OCSP Status Request extension unbounded memory growth
        - debian/patches/CVE-2016-6304.patch: remove OCSP_RESPIDs from previous
          handshake in ssl/t1_lib.c.
        - CVE-2016-6304
      * SECURITY UPDATE: Certificate message OOB reads
        - debian/patches/CVE-2016-6306-1.patch: check lengths in ssl/s3_clnt.c,
          ssl/s3_srvr.c.
        - debian/patches/CVE-2016-6306-2.patch: make message buffer slightly
          larger in ssl/d1_both.c, ssl/s3_both.c.
        - CVE-2016-6306
    
     -- Marc Deslauriers <email address hidden>  Thu, 22 Sep 2016 08:22:22 -0400
  • openssl (1.0.2g-1ubuntu4.3) xenial; urgency=medium
    
      * Remove incomplete FIPS patches for now. (LP: #1614210)
        (related bugs: LP: #1594748, LP: #1593953, LP: #1591797, LP: #1588524)
        - debian/patches/*fips*.patch: removed.
        - debian/rules: removed fips from CONFARGS.
    
     -- Marc Deslauriers <email address hidden>  Fri, 19 Aug 2016 13:03:55 -0400
  • openssl (1.0.2g-1ubuntu4.2) xenial; urgency=medium
    
      * Cherry-pick s390x assembly pack bugfix to cache capability query
        results for improved performance. LP: #1601836.
      * Enable asm optimisations on s390x. LP: #1602655.
    
     -- Dimitri John Ledkov <email address hidden>  Thu, 28 Jul 2016 15:37:07 +0300
  • openssl (1.0.2g-1ubuntu4.1) xenial-security; urgency=medium
    
      * SECURITY UPDATE: EVP_EncodeUpdate overflow
        - debian/patches/CVE-2016-2105.patch: properly check lengths in
          crypto/evp/encode.c, add documentation to
          doc/crypto/EVP_EncodeInit.pod, doc/crypto/evp.pod.
        - CVE-2016-2105
      * SECURITY UPDATE: EVP_EncryptUpdate overflow
        - debian/patches/CVE-2016-2106.patch: fix overflow in
          crypto/evp/evp_enc.c.
        - CVE-2016-2106
      * SECURITY UPDATE: Padding oracle in AES-NI CBC MAC check
        - debian/patches/CVE-2016-2107.patch: check that there are enough
          padding characters in crypto/evp/e_aes_cbc_hmac_sha1.c,
          crypto/evp/e_aes_cbc_hmac_sha256.c.
        - CVE-2016-2107
      * SECURITY UPDATE: Memory corruption in the ASN.1 encoder
        - debian/patches/CVE-2016-2108.patch: fix ASN1_INTEGER handling in
          crypto/asn1/a_type.c, crypto/asn1/asn1.h, crypto/asn1/tasn_dec.c,
          crypto/asn1/tasn_enc.c.
        - CVE-2016-2108
      * SECURITY UPDATE: ASN.1 BIO excessive memory allocation
        - debian/patches/CVE-2016-2109.patch: properly handle large amounts of
          data in crypto/asn1/a_d2i_fp.c.
        - CVE-2016-2109
    
     -- Marc Deslauriers <email address hidden>  Thu, 28 Apr 2016 09:15:39 -0400
  • openssl (1.0.2g-1ubuntu4) xenial; urgency=medium
    
      * Rename Fedora-imported FIPS patches to the names they have in Fedora, add
        correct "Origin:" tags, and move Ubuntu modifications in them into
        openssl-1.0.2g-ubuntu-fips-cleanup.patch.
    
     -- Joy Latten <email address hidden>  Fri, 15 Apr 2016 06:58:01 +0200
  • openssl (1.0.2g-1ubuntu3) xenial; urgency=medium
    
      * Add fips support to openssl, LP: #1553309
        - debian/patches/openssl-1.0.2g-fips.patch: [PATCH 1/6] Add selftest, fips
          support, crypto compliance and define OPENSSL_FIPS.
        - debian/patches/openssl-1.0.2g-fips-ec.patch: [PATCH 2/6] Add fips compliance
          for EC curves.
        - debian/patches/openssl-1.0.2g-fips-md5-allow.patch: [PATCH 3/6] Allow md5 in
          fips mode.
        - debian/patches/openssl-1.0.2g-fips-ctor.patch: [PATCH 4/6] Re-factor integrity
          check for fips mode.
        - debian/patches/openssl-1.0.2g-new-fips-reqs.patch: [PATCH 5/6] New fips
          requirements.
        - debian/patches/openssl-1.0.2g-ubuntu-fips-cleanup.patch: [PATCH 6/6] Cleanup
          compiler warnings, use upstream error codes, DSA, DSA2, fips_utl.h; add
          additional upstream tests to fips_test_suite; allow all EC curves.
    
     -- Joy Latten <email address hidden>  Tue, 12 Apr 2016 15:33:50 -0500
  • openssl (1.0.2g-1ubuntu2) xenial; urgency=medium
    
      * debian/patches/arm64-aarch64_asm.patch: Enable aarch64 asm routines
        (LP: #1552939).
    
     -- dann frazier <email address hidden>  Mon, 07 Mar 2016 10:03:26 -0700
  • openssl (1.0.2g-1ubuntu1) xenial; urgency=medium
    
      * Merge with Debian, remaining changes.
        - Disable SSLv3 without changing ABI:
          + debian/patches/no-sslv3.patch: Disable SSLv3 without using the
            no-ssl3-method option
          + debian/rules: don't use no-ssl3-method, don't bump soname
          + debian/patches/engines-path.patch: don't bump soname
          + debian/patches/version-script.patch: don't bump soname
          + debian/patches/soname.patch: removed
          + debian/lib*: don't bump soname
        - debian/control: don't enable rfc3779 and cms support for now as it
          changes ABI.
        - debian/libssl1.0.0.postinst:
          + Display a system restart required notification on libssl1.0.0
            upgrade on servers.
          + Use a different priority for libssl1.0.0/restart-services depending
            on whether a desktop, or server dist-upgrade is being performed.
        - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
          libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
          in Debian).
        - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
          rules}: Move runtime libraries to /lib, for the benefit of
          wpasupplicant.
        - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
          .pc.
        - debian/rules:
          + Don't run 'make test' when cross-building.
          + Use host compiler when cross-building.  Patch from Neil Williams.
          + Don't build for processors no longer supported: i586 (on i386)
          + Fix Makefile to properly clean up libs/ dirs in clean target.
          + Replace duplicate files in the doc directory with symlinks.
        - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
        - debian/rules: Enable optimized 64bit elliptic curve code contributed
          by Google.
    
    openssl (1.0.2g-1) unstable; urgency=high
    
      * New upstream version
      * Fix CVE-2016-0797
      * Fix CVE-2016-0798
      * Fix CVE-2016-0799
      * Fix CVE-2016-0702
      * Fix CVE-2016-0705
      * Disable EXPORT and LOW ciphers: The DROWN attack (CVE-2016-0800)
        makes use of those, and SLOTH attack (CVE-2015-7575) can make use of them
        too.
    
     -- Marc Deslauriers <email address hidden>  Tue, 01 Mar 2016 14:09:30 -0500
  • openssl (1.0.2f-2ubuntu1) xenial; urgency=medium
    
      * Merge with Debian, remaining changes.
        - Disable SSLv3 without changing ABI:
          + debian/patches/no-sslv3.patch: Disable SSLv3 without using the
            no-ssl3-method option
          + debian/rules: don't use no-ssl3-method, don't bump soname
          + debian/patches/engines-path.patch: don't bump soname
          + debian/patches/version-script.patch: don't bump soname
          + debian/patches/soname.patch: removed
          + debian/lib*: don't bump soname
        - debian/control: don't enable rfc3779 and cms support for now as it
          changes ABI.
        - debian/libssl1.0.0.postinst:
          + Display a system restart required notification on libssl1.0.0
            upgrade on servers.
          + Use a different priority for libssl1.0.0/restart-services depending
            on whether a desktop, or server dist-upgrade is being performed.
        - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
          libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
          in Debian).
        - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
          rules}: Move runtime libraries to /lib, for the benefit of
          wpasupplicant.
        - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
          .pc.
        - debian/rules:
          + Don't run 'make test' when cross-building.
          + Use host compiler when cross-building.  Patch from Neil Williams.
          + Don't build for processors no longer supported: i586 (on i386)
          + Fix Makefile to properly clean up libs/ dirs in clean target.
          + Replace duplicate files in the doc directory with symlinks.
        - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
        - debian/rules: Enable optimized 64bit elliptic curve code contributed
          by Google.
      * debian/patches/CVE-2016-0701.patch: dropped, upstream.
    
    openssl (1.0.2f-2) unstable; urgency=high
    
      * New upstream version.
        - Fixes CVE-2016-0701
        - Not affected by CVE-2015-3197 because SSLv2 is disabled.
    
     -- Marc Deslauriers <email address hidden>  Tue, 02 Feb 2016 13:37:21 -0500
  • openssl (1.0.2e-1ubuntu2) xenial; urgency=medium
    
      * SECURITY UPDATE: DH small subgroups issue
        - debian/patches/CVE-2016-0701.patch: add a test for small subgroup
          attacks in crypto/dh/dhtest.c, always generate DH keys for ephemeral
          DH cipher suites in doc/ssl/SSL_CTX_set_tmp_dh_callback.pod,
          ssl/s3_lib.c, ssl/s3_srvr.c, ssl/ssl.h, prevent small subgroup
          attacks on DH/DHE in crypto/dh/dh.h, crypto/dh/dh_check.c.
        - CVE-2016-0701
    
     -- Marc Deslauriers <email address hidden>  Mon, 25 Jan 2016 13:39:46 -0500
  • openssl (1.0.2e-1ubuntu1) xenial; urgency=medium
    
      * Merge with Debian, remaining changes.
        - Disable SSLv3 without changing ABI:
          + debian/patches/no-sslv3.patch: Disable SSLv3 without using the
            no-ssl3-method option
          + debian/rules: don't use no-ssl3-method, don't bump soname
          + debian/patches/engines-path.patch: don't bump soname
          + debian/patches/version-script.patch: don't bump soname
          + debian/patches/soname.patch: removed
          + debian/lib*: don't bump soname
        - debian/control: don't enable rfc3779 and cms support for now as it
          changes ABI.
        - debian/libssl1.0.0.postinst:
          + Display a system restart required notification on libssl1.0.0
            upgrade on servers.
          + Use a different priority for libssl1.0.0/restart-services depending
            on whether a desktop, or server dist-upgrade is being performed.
        - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
          libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
          in Debian).
        - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
          rules}: Move runtime libraries to /lib, for the benefit of
          wpasupplicant.
        - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
          .pc.
        - debian/rules:
          + Don't run 'make test' when cross-building.
          + Use host compiler when cross-building.  Patch from Neil Williams.
          + Don't build for processors no longer supported: i586 (on i386)
          + Fix Makefile to properly clean up libs/ dirs in clean target.
          + Replace duplicate files in the doc directory with symlinks.
        - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
        - debian/rules: Enable optimized 64bit elliptic curve code contributed
          by Google.
    
    openssl (1.0.2e-1) unstable; urgency=high
    
      * New upstream release
        - Fix CVE-2015-3193
        - Fix CVE-2015-3194
        - Fix CVE-2015-3195
        - Fix CVE-2015-3196
      * Remove all symlinks during clean
      * Run make depend after configure
      * Remove openssl_button.* from the doc package
    
    openssl (1.0.2d-3) unstable; urgency=medium
    
      * Upload to unstable
    
    openssl (1.0.2d-2) experimental; urgency=medium
    
      * Build with no-ssl3-method to remove all SSLv3 support.  This results in
        the functions SSLv3_method(), SSLv3_server_method() and
        SSLv3_client_method() being removed from libssl.  Change the soname as
        result of that and also changes name of the binary package.
        (Closes: #768476)
      * Enable rfc3779 and cms support (Closes: #630790)
      * Fix cross compilation for mips architectures. (Closes: #782492)
    
    openssl (1.0.2d-1) unstable; urgency=high
    
      * New upstream version
        - Fixes CVE-2015-1793
    
     -- Marc Deslauriers <email address hidden>  Fri, 04 Dec 2015 08:24:39 -0500
  • openssl (1.0.2d-0ubuntu2) xenial; urgency=medium
    
      * debian/patches/no-sslv3.patch: Disable SSLv3 without using the
        no-ssl3-method option, as that changes ABI and we don't want to break
        compatibility with third party applications and applications built for
        older versions of Ubuntu, especially for an LTS release.
    
     -- Marc Deslauriers <email address hidden>  Mon, 09 Nov 2015 17:37:38 -0500
  • openssl (1.0.2d-0ubuntu1) wily; urgency=medium
    
      * SECURITY UPDATE: alternative chains certificate forgery
        - Updated to new upstream version
        - CVE-2015-1793
    
     -- Marc Deslauriers <email address hidden>  Thu, 09 Jul 2015 09:27:48 -0400