lp://staging/ubuntu/saucy-security/openssl
- Get this branch:
- bzr branch lp://staging/ubuntu/saucy-security/openssl
Branch merges
Branch information
Recent revisions
- 102. By Marc Deslauriers
-
* SECURITY UPDATE: regression with certain renegotiations (LP: #1332643)
- debian/patches/ CVE-2014- 0224-regression 2.patch: accept CCS after
sending finished ssl/s3_clnt.c. - 101. By Marc Deslauriers
-
* SECURITY UPDATE: regression with tls_session_
secret_ cb (LP: #1329297)
- debian/patches/ CVE-2014- 0224.patch: set the CCS_OK flag when using
tls_session_ secret_ cb for session resumption in ssl/s3_clnt.c. - 100. By Marc Deslauriers
-
* SECURITY UPDATE: arbitrary code execution via DTLS invalid fragment
- debian/patches/ CVE-2014- 0195.patch: add consistency check for DTLS
fragments in ssl/d1_both.c.
- CVE-2014-0195
* SECURITY UPDATE: denial of service via DTLS recursion flaw
- debian/patches/ CVE-2014- 0221.patch: handle DTLS hello request without
recursion in ssl/d1_both.c.
- CVE-2014-0221
* SECURITY UPDATE: MITM via change cipher spec
- debian/patches/ CVE-2014- 0224-1. patch: only accept change cipher spec
when it is expected in ssl/s3_clnt.c, ssl/s3_pkt.c, ssl/s3_srvr.c,
ssl/ssl3.h.
- debian/patches/ CVE-2014- 0224-2. patch: don't accept zero length master
secrets in ssl/s3_pkt.c.
- debian/patches/ CVE-2014- 0224-3. patch: allow CCS after resumption in
ssl/s3_clnt.c.
- CVE-2014-0224
* SECURITY UPDATE: denial of service via ECDH null session cert
- debian/patches/ CVE-2014- 3470.patch: check session_cert is not NULL
before dereferencing it in ssl/s3_clnt.c.
- CVE-2014-3470 - 99. By Marc Deslauriers
-
* SECURITY UPDATE: denial of service via use after free
- debian/patches/ CVE-2010- 5298.patch: check s->s3->rbuf.left before
releasing buffers in ssl/s3_pkt.c.
- CVE-2010-5298
* SECURITY UPDATE: denial of service via null pointer dereference
- debian/patches/ CVE-2014- 0198.patch: if buffer was released, get a new
one in ssl/s3_pkt.c.
- CVE-2014-0198 - 98. By Marc Deslauriers
-
* SECURITY UPDATE: side-channel attack on Montgomery ladder implementation
- debian/patches/ CVE-2014- 0076.patch: add and use constant time swap in
crypto/bn/bn.h, crypto/bn/bn_lib.c, crypto/ec/ec2_ mult.c,
util/libeay. num.
- CVE-2014-0076
* SECURITY UPDATE: memory disclosure in TLS heartbeat extension
- debian/patches/ CVE-2014- 0160.patch: use correct lengths in
ssl/d1_both.c, ssl/t1_lib.c.
- CVE-2014-0160 - 97. By Marc Deslauriers
-
* SECURITY UPDATE: denial of service via invalid TLS handshake
- debian/patches/ CVE-2013- 4353.patch: handle no new cipher setup in
ssl/s3_both.c.
- CVE-2013-4353
* SECURITY UPDATE: denial of service via incorrect data structure
- debian/patches/ CVE-2013- 6449.patch: check for handshake digests in
ssl/s3_both. c,ssl/s3_ pkt.c,ssl/ t1_enc. c, use proper version in
ssl/s3_lib.c.
- CVE-2013-6449
* SECURITY UPDATE: denial of service via DTLS retransmission
- debian/patches/ CVE-2013- 6450.patch: fix DTLS retransmission in
crypto/evp/digest. c,ssl/d1_ both.c, ssl/s3_ pkt.c,ssl/ s3_srvr. c,
ssl/ssl_locl. h,ssl/t1_ enc.c.
- CVE-2013-6450
* debian/patches/ no_default_ rdrand. patch: Don't use rdrand engine as
default unless explicitly requested. - 96. By Matthias Klose
-
* Merge with Debian, remaining changes.
- debian/libssl1. 0.0.postinst:
+ Display a system restart required notification on libssl1.0.0
upgrade on servers.
+ Use a different priority for libssl1.0.0/restart- services depending
on whether a desktop, or server dist-upgrade is being performed.
- debian/{libssl1. 0.0-udeb. dirs, control, rules}: Create
libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
in Debian).
- debian/{libcrypto1. 0.0-udeb. dirs, libssl1.0.0.dirs, libssl1.0.0.files,
rules}: Move runtime libraries to /lib, for the benefit of
wpasupplicant.
- debian/patches/ perlpath- quilt.patch: Don't change perl #! paths under
.pc.
- debian/rules:
+ Don't run 'make test' when cross-building.
+ Use host compiler when cross-building. Patch from Neil Williams.
+ Don't build for processors no longer supported: i586 (on i386)
+ Fix Makefile to properly clean up libs/ dirs in clean target.
+ Replace duplicate files in the doc directory with symlinks.
- Unapply patch c_rehash-multi and comment it out in the series as it
breaks parsing of certificates with CRLF line endings and other cases
(see Debian #642314 for discussion), it also changes the semantics of
c_rehash directories by requiring applications to parse hash link
targets as files containing potentially *multiple* certificates rather
than exactly one.
- debian/patches/ tls12_workaroun ds.patch: Workaround large client hello
issues when TLS 1.1 and lower is in use
- debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
- debian/patches/ ubuntu_ deb676533_ arm_asm. patch: Enable arm assembly
code.
- debian/patches/ arm64-support: Add basic arm64 support (no assembler)
- debian/rules: Enable optimized 64bit elliptic curve code contributed
by Google.
* debian/patches/ tls12_workaroun ds.patch: updated to also disable TLS 1.2
in test suite since we disable it in the client.
* Disable compression to avoid CRIME systemwide (CVE-2012-4929).
* Dropped changes:
- debian/patches/ ubuntu_ deb676533_ arm_asm. patch, applied in Debian. - 95. By Seth Arnold
-
* SECURITY UPDATE: Disable compression to avoid CRIME systemwide
(LP: #1187195)
- CVE-2012-4929
- debian/patches/ openssl- 1.0.1e- env-zlib. patch: disable default use of
zlib to compress SSL/TLS unless the environment variable
OPENSSL_DEFAULT_ ZLIB is set in the environment during library
initialization.
- Introduced to assist with programs not yet updated to provide their own
controls on compression, such as Postfix
- http://pkgs.fedoraproj ect.org/ cgit/openssl. git/plain/ openssl- 1.0.1e- env-zlib. patch - 94. By Marc Deslauriers
-
* Resynchronise with Debian unstable. Remaining changes:
- debian/libssl1. 0.0.postinst:
+ Display a system restart required notification on libssl1.0.0
upgrade on servers.
+ Use a different priority for libssl1.0.0/restart- services depending
on whether a desktop, or server dist-upgrade is being performed.
- debian/{libssl1. 0.0-udeb. dirs, control, rules}: Create
libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
in Debian).
- debian/{libcrypto1. 0.0-udeb. dirs, libssl1.0.0.dirs, libssl1.0.0.files,
rules}: Move runtime libraries to /lib, for the benefit of
wpasupplicant.
- debian/patches/ perlpath- quilt.patch: Don't change perl #! paths under
.pc.
- debian/rules:
+ Don't run 'make test' when cross-building.
+ Use host compiler when cross-building. Patch from Neil Williams.
+ Don't build for processors no longer supported: i586 (on i386)
+ Fix Makefile to properly clean up libs/ dirs in clean target.
+ Replace duplicate files in the doc directory with symlinks.
- Unapply patch c_rehash-multi and comment it out in the series as it
breaks parsing of certificates with CRLF line endings and other cases
(see Debian #642314 for discussion), it also changes the semantics of
c_rehash directories by requiring applications to parse hash link
targets as files containing potentially *multiple* certificates rather
than exactly one.
- debian/patches/ tls12_workaroun ds.patch: Workaround large client hello
issues when TLS 1.1 and lower is in use
- debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
- debian/patches/ ubuntu_ deb676533_ arm_asm. patch: Enable arm assembly
code.
- debian/patches/ arm64-support: Add basic arm64 support (no assembler)
- debian/rules: Enable optimized 64bit elliptic curve code contributed
by Google.
* debian/patches/ tls12_workaroun ds.patch: updated to also disable TLS 1.2
in test suite since we disable it in the client.
* Dropped changes:
- debian/patches/ CVE-2013- 0169.patch: upstream.
- debian/patches/ fix_key_ decoding_ deadlock. patch: upstream.
- debian/patches/ CVE-2013- 0166.patch: upstream. - 93. By Marc Deslauriers
-
* SECURITY UPDATE: "Lucky Thirteen" timing side-channel TLS attack
- debian/patches/ CVE-2013- 0169.patch: re-enabled patch and added extra
commit from upstream to fix regression.
- CVE-2013-0169
Branch metadata
- Branch format:
- Branch format 7
- Repository format:
- Bazaar repository format 2a (needs bzr 1.16 or later)
- Stacked on:
- lp://staging/ubuntu/trusty/openssl