Package "libssl-dev"
Name: |
libssl-dev
|
Description: |
Secure Sockets Layer toolkit - development files
|
Latest version: |
1.1.1f-1ubuntu2.23 |
Release: |
focal (20.04) |
Level: |
security |
Repository: |
main |
Head package: |
openssl |
Homepage: |
https://www.openssl.org/ |
Links
Download "libssl-dev"
Other versions of "libssl-dev" in Focal
Changelog
openssl (1.1.1f-1ubuntu2.18) focal-security; urgency=medium
* SECURITY UPDATE: excessive resource use when verifying policy constraints
- debian/patches/CVE-2023-0464-1.patch: limit the number of nodes created
in a policy tree (the default limit is set to 1000 nodes).
- debian/patches/CVE-2023-0464-2.patch: add test cases for the policy
resource overuse.
- debian/patches/CVE-2023-0464-3.patch: disable the policy tree
exponential growth test conditionally.
- CVE-2023-0464
* SECURITY UPDATE: invalid certificate policies ignored in leaf certificates
- debian/patches/CVE-2023-0465-1.patch: ensure that EXFLAG_INVALID_POLICY
is checked even in leaf certs.
- debian/patches/CVE-2023-0465-2.patch: generate some certificates with
the certificatePolicies extension.
- debian/patches/CVE-2023-0465-3.patch: add a certificate policies test.
- CVE-2023-0466
* SECURITY UPDATE: certificate policy check in X509_VERIFY_PARAM_add0_policy
not enabled as documented
- debian/patches/CVE-2023-0466.patch: fix documentation of
X509_VERIFY_PARAM_add0_policy().
- CVE-2023-0466
-- Camila Camargo de Matos <email address hidden> Mon, 17 Apr 2023 15:11:39 -0300
|
Source diff to previous version |
CVE-2023-0464 |
A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that includ |
|
openssl (1.1.1f-1ubuntu2.17) focal-security; urgency=medium
* SECURITY UPDATE: Timing Oracle in RSA Decryption
- debian/patches/CVE-2022-4304.patch: fix timing oracle in
crypto/bn/bn_blind.c, crypto/bn/bn_err.c, crypto/bn/bn_local.h,
crypto/bn/build.info, crypto/bn/rsa_sup_mul.c,
crypto/err/openssl.txt, crypto/rsa/rsa_ossl.c, include/crypto/bn.h,
include/openssl/bnerr.h.
- CVE-2022-4304
* SECURITY UPDATE: Double free after calling PEM_read_bio_ex
- debian/patches/CVE-2022-4450-1.patch: avoid dangling ptrs in header
and data params for PEM_read_bio_ex in crypto/pem/pem_lib.c.
- debian/patches/CVE-2022-4450-2.patch: add a test in test/pemtest.c.
- CVE-2022-4450
* SECURITY UPDATE: Use-after-free following BIO_new_NDEF
- debian/patches/CVE-2023-0215-1.patch: fix a UAF resulting from a bug
in BIO_new_NDEF in crypto/asn1/bio_ndef.c.
- debian/patches/CVE-2023-0215-2.patch: check CMS failure during BIO
setup with -stream is handled correctly in
test/recipes/80-test_cms.t, test/smime-certs/badrsa.pem.
- CVE-2023-0215
* SECURITY UPDATE: X.400 address type confusion in X.509 GeneralName
- debian/patches/CVE-2023-0286.patch: fix GENERAL_NAME_cmp for
x400Address in crypto/x509/v3_genn.c, include/openssl/x509v3.h,
test/v3nametest.c.
- CVE-2023-0286
-- Marc Deslauriers <email address hidden> Mon, 06 Feb 2023 12:57:17 -0500
|
Source diff to previous version |
|
openssl (1.1.1f-1ubuntu2.16) focal-security; urgency=medium
* SECURITY UPDATE: AES OCB fails to encrypt some bytes
- debian/patches/CVE-2022-2097-1.patch: fix AES OCB encrypt/decrypt for
x86 AES-NI in crypto/aes/asm/aesni-x86.pl.
- debian/patches/CVE-2022-2097-2.patch: add AES OCB test vectors in
test/recipes/30-test_evp_data/evpciph.txt.
- CVE-2022-2097
-- Marc Deslauriers <email address hidden> Mon, 04 Jul 2022 07:24:28 -0400
|
Source diff to previous version |
CVE-2022-2097 |
AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimi ... |
|
openssl (1.1.1f-1ubuntu2.15) focal-security; urgency=medium
* SECURITY UPDATE: c_rehash script allows command injection
- debian/patches/CVE-2022-1292.patch: switch to upstream patch, and
apply it before c_rehash-compat.patch.
- debian/patches/CVE-2022-2068.patch: fix file operations in
tools/c_rehash.in.
- debian/patches/c_rehash-compat.patch: updated patch to apply after
the security updates.
- CVE-2022-2068
-- Marc Deslauriers <email address hidden> Wed, 15 Jun 2022 14:16:37 -0400
|
Source diff to previous version |
CVE-2022-1292 |
The c_rehash script does not properly sanitise shell metacharacters to ... |
CVE-2022-2068 |
The c_rehash script allows command injection |
|
openssl (1.1.1f-1ubuntu2.13) focal-security; urgency=medium
* SECURITY UPDATE: c_rehash script allows command injection
- debian/patches/CVE-2022-1292.patch: do not use shell to invoke
openssl in tools/c_rehash.in.
- CVE-2022-1292
-- Marc Deslauriers <email address hidden> Tue, 03 May 2022 13:49:36 -0400
|
CVE-2022-1292 |
The c_rehash script does not properly sanitise shell metacharacters to ... |
|
About
-
Send Feedback to @ubuntu_updates