lp://staging/ubuntu/hardy-proposed/openssl
- Get this branch:
- bzr branch lp://staging/ubuntu/hardy-proposed/openssl
Branch merges
Branch information
Recent revisions
- 29. By Marc Deslauriers
-
* SECURITY UPDATE: TLS renegotiation flaw (LP: #616759)
- apps/{s_cb,s_client, s_server} .c, doc/ssl/ SSL_CTX_ set_options. pod,
ssl/{d1_both, d1_clnt, d1_srvr, s3_both, s3_clnt, s3_pkt, s3_srvr, ssl_err,
ssl_lib,t1_ lib,t1_ reneg}. c, ssl/Makefile, ssl/{ssl3, ssl,ssl_ locl,
tls1}.h: backport rfc5746 support from openssl 0.9.8m.
- CVE-2009-3555
* Enable tlsext, and backport some patches from jaunty now that tlsext is
enabled.
- Fix a problem with tlsext preventing firefox 3 from connection.
- Don't add extentions to ssl v3 connections. It breaks with some
other software. - 28. By Kees Cook
-
* SECURITY UPDATE: memory leak possible during state clean-up.
- crypto/comp/c_ zlib.c: upstream fixes applied inline.
- CVE-2009-4355 - 27. By Marc Deslauriers
-
* SECURITY UPDATE: certificate spoofing via hash collisions from MD2
design flaws.
- crypto/evp/c_alld. c, ssl/ssl_algs.c: disable MD2 digest.
- crypto/x509/x509_ vfy.c: skip signature check for self signed
certificates
- http://marc.info/ ?l=openssl- cvs&m=124508133 203041& w=2
- http://marc.info/ ?l=openssl- cvs&m=124704528 713852& w=2
- CVE-2009-2409 - 26. By Marc Deslauriers
-
* SECURITY UPDATE: denial of service via memory consumption from large
number of future epoch DTLS records.
- crypto/pqueue.*: add new pqueue_size counter function.
- ssl/d1_pkt.c: use pqueue_size to limit size of queue to 100.
- http://cvs.openssl. org/chngview? cn=18187
- CVE-2009-1377
* SECURITY UPDATE: denial of service via memory consumption from
duplicate or invalid sequence numbers in DTLS records.
- ssl/d1_both.c: discard message if it's a duplicate or too far in the
future.
- http://marc.info/ ?l=openssl- dev&m=124263491 424212& w=2
- CVE-2009-1378
* SECURITY UPDATE: denial of service or other impact via use-after-free
in dtls1_retrieve_buffered_ fragment.
- ssl/d1_both.c: use temp frag_len instead of freed frag.
- http://rt.openssl. org/Ticket/ Display. html?id= 1923
- CVE-2009-1379
* SECURITY UPDATE: denial of service via DTLS ChangeCipherSpec packet
that occurs before ClientHello.
- ssl/s3_pkt.c: abort if s->session is NULL.
- ssl/{ssl.h,ssl_err. c}: add new error codes.
- http://cvs.openssl. org/chngview? cn=17369
- CVE-2009-1386
* SECURITY UPDATE: denial of service via an out-of-sequence DTLS
handshake message.
- ssl/d1_both.c: don't buffer fragments with no data.
- http://cvs.openssl. org/chngview? cn=17958
- CVE-2009-1387 - 25. By Jamie Strandboge
-
* SECURITY UPDATE: crash via invalid memory access when printing BMPString
or UniversalString with invalid length
- crypto/asn1/tasn_ dec.c, crypto/ asn1/asn1_ err.c and crypto/asn1/asn1.h:
return error if invalid length
- CVE-2009-0590
- http://www.openssl. org/news/ secadv_ 20090325. txt
- patch from upstream CVS:
crypto/asn1/asn1. h:1.128. 2.11->1. 128.2.12
crypto/asn1/asn1_ err.c:1. 54.2.4- >1.54.2. 5
crypto/asn1/tasn_ dec.c:1. 26.2.10- >1.26.2. 11 - 24. By Jamie Strandboge
-
* SECURITY UPDATE: clients treat malformed signatures as good when verifying
server DSA and ECDSA certificates
- update apps/speed.c, apps/spkac.c, apps/verify.c, apps/x509.c,
ssl/s2_clnt.c, ssl/s2_srvr.c, ssl/s3_clnt.c, s3_srvr.c, and
ssl/ssltest.c to properly check the return code of EVP_VerifyFinal()
- patch based on upstream patch for #2008-016
- CVE-2008-5077 - 23. By Jamie Strandboge
-
* SECURITY UPDATE: fix denial of service when 'Server Key exchange message'
is omitted from a TLS handshake
* ssl/s3_clnt.c: make sure s->session->sess_cert is not NULL
* SECURITY UPDATE: fix denial of service when using tlsext. Note that
this version of openssl does not use tlsext by default.
* ssl/t1_lib.c: make sure s->session->tlsext_ hostname is set to NULL to
prevent double free.
* References
CVE-2008-1672
CVE-2008-0891
LP: #235913 - 22. By Kees Cook
-
* SECURITY UPDATE: PRNG seeding was not fully operational.
* crypto/rand/md_ rand.c: restore upstream code. - 21. By Luke Yelavich
-
* Use a different priority for libssl0.
9.8/restart- services depending on whether
a desktop, or server dist-upgrade is being performed. (LP: #91814)
* Display a system restart required notification bubble on libssl0.9.8 upgrade. - 20. By Martin Pitt
-
Ship documentation in new openssl-doc package, since it is very large and
not terribly useful for the casual desktop user.
Branch metadata
- Branch format:
- Branch format 7
- Repository format:
- Bazaar repository format 2a (needs bzr 1.16 or later)
- Stacked on:
- lp://staging/ubuntu/maverick/openssl