Package "openssl"
Name: |
openssl
|
Description: |
Secure Sockets Layer toolkit - cryptographic utility
|
Latest version: |
1.1.1-1ubuntu2.1~18.04.23 |
Release: |
bionic (18.04) |
Level: |
security |
Repository: |
main |
Homepage: |
https://www.openssl.org/ |
Links
Download "openssl"
Other versions of "openssl" in Bionic
Packages in group
Deleted packages are displayed in grey.
Changelog
openssl (1.1.1-1ubuntu2.1~18.04.17) bionic-security; urgency=medium
* SECURITY UPDATE: c_rehash script allows command injection
- debian/patches/CVE-2022-1292.patch: do not use shell to invoke
openssl in tools/c_rehash.in.
- CVE-2022-1292
* NOTE: This package does _not_ contain the changes from
1.1.1-1ubuntu2.1~18.04.16 in bionic-proposed.
-- Marc Deslauriers <email address hidden> Tue, 03 May 2022 13:51:42 -0400
|
Source diff to previous version |
CVE-2022-1292 |
The c_rehash script does not properly sanitise shell metacharacters to ... |
|
openssl (1.1.1-1ubuntu2.1~18.04.15) bionic-security; urgency=medium
* SECURITY UPDATE: Infinite loop in BN_mod_sqrt()
- debian/patches/CVE-2022-0778-1.patch: fix infinite loop in
crypto/bn/bn_sqrt.c.
- debian/patches/CVE-2022-0778-2.patch: add documentation of
BN_mod_sqrt() in doc/man3/BN_add.pod.
- debian/patches/CVE-2022-0778-3.patch: add a negative testcase for
BN_mod_sqrt in test/bntest.c, test/recipes/10-test_bn_data/bnmod.txt.
- CVE-2022-0778
-- Marc Deslauriers <email address hidden> Wed, 09 Mar 2022 07:13:40 -0500
|
Source diff to previous version |
CVE-2022-0778 |
Infinite loop in BN_mod_sqrt() reachable when parsing certificates |
|
openssl (1.1.1-1ubuntu2.1~18.04.13) bionic-security; urgency=medium
* SECURITY UPDATE: SM2 Decryption Buffer Overflow
- debian/patches/CVE-2021-3711-1.patch: correctly calculate the length
of SM2 plaintext given the ciphertext in crypto/sm2/sm2_crypt.c,
crypto/sm2/sm2_pmeth.c, crypto/include/internal/sm2.h,
test/sm2_internal_test.c.
- debian/patches/CVE-2021-3711-2.patch: extend tests for SM2 decryption
in test/recipes/30-test_evp_data/evppkey.txt.
- debian/patches/CVE-2021-3711-3.patch: check the plaintext buffer is
large enough when decrypting SM2 in crypto/sm2/sm2_crypt.c.
- CVE-2021-3711
* SECURITY UPDATE: Read buffer overrun in X509_aux_print()
- debian/patches/CVE-2021-3712.patch: fix a read buffer overrun in
X509_aux_print() in crypto/x509/t_x509.c.
- debian/patches/CVE-2021-3712-2.patch: fix i2v_GENERAL_NAME to not
assume NUL terminated strings in crypto/x509v3/v3_alt.c,
crypto/x509v3/v3_utl.c, crypto/include/internal/x509_int.h.
- debian/patches/CVE-2021-3712-3.patch: fix POLICYINFO printing to not
assume NUL terminated strings in crypto/x509v3/v3_cpols.c.
- debian/patches/CVE-2021-3712-4.patch: fix printing of
PROXY_CERT_INFO_EXTENSION to not assume NUL terminated strings in
crypto/x509v3/v3_pci.c.
- debian/patches/CVE-2021-3712-5.patch: fix the name constraints code
to not assume NUL terminated strings in crypto/x509v3/v3_ncons.c.
- debian/patches/CVE-2021-3712-6.patch: fix test code to not assume NUL
terminated strings in test/x509_time_test.c.
- debian/patches/CVE-2021-3712-7.patch: fix append_ia5 function to not
assume NUL terminated strings in crypto/x509v3/v3_utl.c.
- debian/patches/CVE-2021-3712-8.patch: fix NETSCAPE_SPKI_print
function to not assume NUL terminated strings in
crypto/asn1/t_spki.c.
- debian/patches/CVE-2021-3712-9.patch: fix
EC_GROUP_new_from_ecparameters to check the base length in
crypto/ec/ec_asn1.c.
- debian/patches/CVE-2021-3712-10.patch: allow fuzz builds to detect
string overruns in crypto/asn1/asn1_lib.c.
- debian/patches/CVE-2021-3712-11.patch: fix the error handling in
i2v_AUTHORITY_KEYID in crypto/x509v3/v3_akey.c.
- debian/patches/CVE-2021-3712-12.patch: allow fuzz builds to detect
string overruns in crypto/asn1/asn1_lib.c.
- debian/patches/CVE-2021-3712-13.patch: fix the name constraints code
to not assume NUL terminated strings in crypto/x509v3/v3_ncons.c.
- debian/patches/CVE-2021-3712-14.patch: fix i2v_GENERAL_NAME to not
assume NUL terminated strings in crypto/x509v3/v3_utl.c.
- CVE-2021-3712
-- Marc Deslauriers <email address hidden> Mon, 23 Aug 2021 13:02:39 -0400
|
Source diff to previous version |
|
openssl (1.1.1-1ubuntu2.1~18.04.9) bionic-security; urgency=medium
* SECURITY UPDATE: NULL pointer deref in signature_algorithms processing
- debian/patches/CVE-2021-3449-1.patch: fix NULL pointer dereference in
ssl/statem/extensions.c.
- debian/patches/CVE-2021-3449-2.patch: teach TLSProxy how to encrypt
<= TLSv1.2 ETM records in util/perl/TLSProxy/Message.pm.
- debian/patches/CVE-2021-3449-3.patch: add a test to
test/recipes/70-test_renegotiation.t.
- debian/patches/CVE-2021-3449-4.patch: ensure buffer/length pairs are
always in sync in ssl/s3_lib.c, ssl/ssl_lib.c,
ssl/statem/extensions.c, ssl/statem/extensions_clnt.c,
ssl/statem/statem_clnt.c, ssl/statem/statem_srvr.c.
- CVE-2021-3449
-- Marc Deslauriers <email address hidden> Mon, 22 Mar 2021 07:42:42 -0400
|
Source diff to previous version |
CVE-2021-3449 |
NULL pointer deref in signature_algorithms processing |
|
openssl (1.1.1-1ubuntu2.1~18.04.8) bionic-security; urgency=medium
* SECURITY UPDATE: Integer overflow in CipherUpdate
- debian/patches/CVE-2021-23840-pre1.patch: add a new EVP error code in
crypto/err/openssl.txt, crypto/evp/evp_err.c,
include/openssl/evperr.h.
- debian/patches/CVE-2021-23840.patch: don't overflow the output length
in EVP_CipherUpdate calls in crypto/err/openssl.txt,
crypto/evp/evp_enc.c, crypto/evp/evp_err.c, include/openssl/evperr.h.
- CVE-2021-23840
* SECURITY UPDATE: Null pointer deref in X509_issuer_and_serial_hash()
- debian/patches/CVE-2021-23841.patch: fix Null pointer deref in
crypto/x509/x509_cmp.c.
- CVE-2021-23841
-- Marc Deslauriers <email address hidden> Wed, 17 Feb 2021 07:35:54 -0500
|
CVE-2021-23840 |
Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is cl |
CVE-2021-23841 |
Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is cl |
|
About
-
Send Feedback to @ubuntu_updates