UbuntuUpdates.org

Package "openssl"

Name: openssl

Description:

Secure Sockets Layer toolkit - cryptographic utility

Latest version: 1.1.1-1ubuntu2.1~18.04.13
Release: bionic (18.04)
Level: security
Repository: main
Homepage: https://www.openssl.org/

Links


Download "openssl"


Other versions of "openssl" in Bionic

Repository Area Version
base main 1.1.0g-2ubuntu4
updates main 1.1.1-1ubuntu2.1~18.04.13
proposed main 1.1.1-1ubuntu2.1~18.04.14

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1.1.1-1ubuntu2.1~18.04.13 2021-08-24 17:06:20 UTC

  openssl (1.1.1-1ubuntu2.1~18.04.13) bionic-security; urgency=medium

  * SECURITY UPDATE: SM2 Decryption Buffer Overflow
    - debian/patches/CVE-2021-3711-1.patch: correctly calculate the length
      of SM2 plaintext given the ciphertext in crypto/sm2/sm2_crypt.c,
      crypto/sm2/sm2_pmeth.c, crypto/include/internal/sm2.h,
      test/sm2_internal_test.c.
    - debian/patches/CVE-2021-3711-2.patch: extend tests for SM2 decryption
      in test/recipes/30-test_evp_data/evppkey.txt.
    - debian/patches/CVE-2021-3711-3.patch: check the plaintext buffer is
      large enough when decrypting SM2 in crypto/sm2/sm2_crypt.c.
    - CVE-2021-3711
  * SECURITY UPDATE: Read buffer overrun in X509_aux_print()
    - debian/patches/CVE-2021-3712.patch: fix a read buffer overrun in
      X509_aux_print() in crypto/x509/t_x509.c.
    - debian/patches/CVE-2021-3712-2.patch: fix i2v_GENERAL_NAME to not
      assume NUL terminated strings in crypto/x509v3/v3_alt.c,
      crypto/x509v3/v3_utl.c, crypto/include/internal/x509_int.h.
    - debian/patches/CVE-2021-3712-3.patch: fix POLICYINFO printing to not
      assume NUL terminated strings in crypto/x509v3/v3_cpols.c.
    - debian/patches/CVE-2021-3712-4.patch: fix printing of
      PROXY_CERT_INFO_EXTENSION to not assume NUL terminated strings in
      crypto/x509v3/v3_pci.c.
    - debian/patches/CVE-2021-3712-5.patch: fix the name constraints code
      to not assume NUL terminated strings in crypto/x509v3/v3_ncons.c.
    - debian/patches/CVE-2021-3712-6.patch: fix test code to not assume NUL
      terminated strings in test/x509_time_test.c.
    - debian/patches/CVE-2021-3712-7.patch: fix append_ia5 function to not
      assume NUL terminated strings in crypto/x509v3/v3_utl.c.
    - debian/patches/CVE-2021-3712-8.patch: fix NETSCAPE_SPKI_print
      function to not assume NUL terminated strings in
      crypto/asn1/t_spki.c.
    - debian/patches/CVE-2021-3712-9.patch: fix
      EC_GROUP_new_from_ecparameters to check the base length in
      crypto/ec/ec_asn1.c.
    - debian/patches/CVE-2021-3712-10.patch: allow fuzz builds to detect
      string overruns in crypto/asn1/asn1_lib.c.
    - debian/patches/CVE-2021-3712-11.patch: fix the error handling in
      i2v_AUTHORITY_KEYID in crypto/x509v3/v3_akey.c.
    - debian/patches/CVE-2021-3712-12.patch: allow fuzz builds to detect
      string overruns in crypto/asn1/asn1_lib.c.
    - debian/patches/CVE-2021-3712-13.patch: fix the name constraints code
      to not assume NUL terminated strings in crypto/x509v3/v3_ncons.c.
    - debian/patches/CVE-2021-3712-14.patch: fix i2v_GENERAL_NAME to not
      assume NUL terminated strings in crypto/x509v3/v3_utl.c.
    - CVE-2021-3712

 -- Marc Deslauriers <email address hidden> Mon, 23 Aug 2021 13:02:39 -0400

Source diff to previous version
CVE-2021-3711 SM2 Decryption Buffer Overflow
CVE-2021-3712 Read buffer overruns processing ASN.1 strings

Version: 1.1.1-1ubuntu2.1~18.04.9 2021-03-25 16:07:10 UTC

  openssl (1.1.1-1ubuntu2.1~18.04.9) bionic-security; urgency=medium

  * SECURITY UPDATE: NULL pointer deref in signature_algorithms processing
    - debian/patches/CVE-2021-3449-1.patch: fix NULL pointer dereference in
      ssl/statem/extensions.c.
    - debian/patches/CVE-2021-3449-2.patch: teach TLSProxy how to encrypt
      <= TLSv1.2 ETM records in util/perl/TLSProxy/Message.pm.
    - debian/patches/CVE-2021-3449-3.patch: add a test to
      test/recipes/70-test_renegotiation.t.
    - debian/patches/CVE-2021-3449-4.patch: ensure buffer/length pairs are
      always in sync in ssl/s3_lib.c, ssl/ssl_lib.c,
      ssl/statem/extensions.c, ssl/statem/extensions_clnt.c,
      ssl/statem/statem_clnt.c, ssl/statem/statem_srvr.c.
    - CVE-2021-3449

 -- Marc Deslauriers <email address hidden> Mon, 22 Mar 2021 07:42:42 -0400

Source diff to previous version
CVE-2021-3449 NULL pointer deref in signature_algorithms processing

Version: 1.1.1-1ubuntu2.1~18.04.8 2021-02-18 14:06:21 UTC

  openssl (1.1.1-1ubuntu2.1~18.04.8) bionic-security; urgency=medium

  * SECURITY UPDATE: Integer overflow in CipherUpdate
    - debian/patches/CVE-2021-23840-pre1.patch: add a new EVP error code in
      crypto/err/openssl.txt, crypto/evp/evp_err.c,
      include/openssl/evperr.h.
    - debian/patches/CVE-2021-23840.patch: don't overflow the output length
      in EVP_CipherUpdate calls in crypto/err/openssl.txt,
      crypto/evp/evp_enc.c, crypto/evp/evp_err.c, include/openssl/evperr.h.
    - CVE-2021-23840
  * SECURITY UPDATE: Null pointer deref in X509_issuer_and_serial_hash()
    - debian/patches/CVE-2021-23841.patch: fix Null pointer deref in
      crypto/x509/x509_cmp.c.
    - CVE-2021-23841

 -- Marc Deslauriers <email address hidden> Wed, 17 Feb 2021 07:35:54 -0500

Source diff to previous version
CVE-2021-23840 Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is cl
CVE-2021-23841 Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is cl

Version: 1.1.1-1ubuntu2.1~18.04.7 2020-12-08 17:07:10 UTC

  openssl (1.1.1-1ubuntu2.1~18.04.7) bionic-security; urgency=medium

  * SECURITY UPDATE: EDIPARTYNAME NULL pointer de-ref
    - debian/patches/CVE-2020-1971-1.patch: use explicit tagging for
      DirectoryString in crypto/x509v3/v3_genn.c.
    - debian/patches/CVE-2020-1971-2.patch: correctly compare EdiPartyName
      in crypto/x509v3/v3_genn.c.
    - debian/patches/CVE-2020-1971-3.patch: check that multi-strings/CHOICE
      types don't use implicit tagging in crypto/asn1/asn1_err.c,
      crypto/asn1/tasn_dec.c, crypto/err/openssl.txt,
      include/openssl/asn1err.h.
    - debian/patches/CVE-2020-1971-4.patch: complain if we are attempting
      to encode with an invalid ASN.1 template in crypto/asn1/asn1_err.c,
      crypto/asn1/tasn_enc.c, crypto/err/openssl.txt,
      include/openssl/asn1err.h.
    - debian/patches/CVE-2020-1971-5.patch: add a test for GENERAL_NAME_cmp
      in test/v3nametest.c.
    - debian/patches/CVE-2020-1971-6.patch: add a test for
      encoding/decoding using an invalid ASN.1 Template in
      test/asn1_decode_test.c, test/asn1_encode_test.c.
    - CVE-2020-1971

 -- Marc Deslauriers <email address hidden> Wed, 02 Dec 2020 09:54:45 -0500

Source diff to previous version
CVE-2020-1971 EDIPARTYNAME NULL pointer de-reference

Version: 1.1.1-1ubuntu2.1~18.04.6 2020-05-28 13:06:51 UTC

  openssl (1.1.1-1ubuntu2.1~18.04.6) bionic-security; urgency=medium

  * SECURITY UPDATE: ECDSA remote timing attack
    - debian/patches/CVE-2019-1547.patch: for ECC parameters with NULL or
      zero cofactor, compute it in crypto/ec/ec_lib.c.
    - CVE-2019-1547
  * SECURITY UPDATE: Fork Protection
    - debian/patches/CVE-2019-1549.patch: ensure fork-safety without using
      a pthread_atfork handler in crypto/include/internal/rand_int.h,
      crypto/init.c, crypto/rand/drbg_lib.c, crypto/rand/rand_lcl.h,
      crypto/rand/rand_lib.c, crypto/threads_none.c,
      crypto/threads_pthread.c, crypto/threads_win.c,
      include/internal/cryptlib.h, test/drbgtest.c.
    - CVE-2019-1549
  * SECURITY UPDATE: rsaz_512_sqr overflow bug on x86_64
    - debian/patches/CVE-2019-1551.patch: fix an overflow bug in
      rsaz_512_sqr in crypto/bn/asm/rsaz-x86_64.pl.
    - CVE-2019-1551
  * SECURITY UPDATE: Padding Oracle issue
    - debian/patches/CVE-2019-1563.patch: fix a padding oracle in
      PKCS7_dataDecode and CMS_decrypt_set1_pkey in crypto/cms/cms_env.c,
      crypto/cms/cms_lcl.h, crypto/cms/cms_smime.c,
      crypto/pkcs7/pk7_doit.c.
    - CVE-2019-1563

 -- Marc Deslauriers <email address hidden> Wed, 27 May 2020 15:15:54 -0400

CVE-2019-1547 Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is po
CVE-2019-1549 OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in o
CVE-2019-1551 There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analy
CVE-2019-1563 In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very l



About   -   Send Feedback to @ubuntu_updates