Change logs for openssl source package in Xenial

  • openssl (1.0.2g-1ubuntu4.10) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Read/write after SSL object in error state
        - debian/patches/CVE-2017-3737-pre.patch: add test/ssltestlib.*,
          add to test/Makefile.
        - debian/patches/CVE-2017-3737-1.patch: don't allow read/write after
          fatal error in ssl/ssl.h.
        - debian/patches/CVE-2017-3737-2.patch: add test to ssl/Makefile,
          ssl/fatalerrtest.c, test/Makefile.
        - CVE-2017-3737
      * SECURITY UPDATE: rsaz_1024_mul_avx2 overflow bug on x86_64
        - debian/patches/CVE-2017-3738.patch: fix digit correction bug in
          crypto/bn/asm/rsaz-avx2.pl.
        - CVE-2017-3738
    
     -- Marc Deslauriers <email address hidden>  Thu, 07 Dec 2017 13:17:37 -0500
  • openssl (1.0.2g-1ubuntu4.9) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Malformed X.509 IPAddressFamily could cause OOB read
        - debian/patches/CVE-2017-3735.patch: avoid out-of-bounds read in
          crypto/x509v3/v3_addr.c.
        - CVE-2017-3735
      * SECURITY UPDATE: bn_sqrx8x_internal carry bug on x86_64
        - debian/patches/CVE-2017-3736.patch: fix carry bug in
          bn_sqrx8x_internal in crypto/bn/asm/x86_64-mont5.pl.
        - CVE-2017-3736
    
     -- Marc Deslauriers <email address hidden>  Thu, 02 Nov 2017 11:28:46 -0400
  • openssl (1.0.2g-1ubuntu4.8) xenial; urgency=medium
    
      * aes/asm/aesni-sha*-x86_64.pl: fix IV handling in SHAEXT paths.
        (LP: #1674399)
    
     -- William Grant <email address hidden>  Fri, 19 May 2017 18:27:58 +1000
  • openssl (1.0.2g-1ubuntu4.7) xenial; urgency=medium
    
      * crypto/x86*cpuid.pl: move extended feature detection. (LP: #1674399)
        This fix moves extended feature detection past basic feature
        detection where it belongs. 32-bit counterpart is harmonized too.
    
     -- Eric Desrochers <email address hidden>  Wed, 26 Apr 2017 09:08:02 -0400
  • openssl (1.0.2g-1ubuntu4.6) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Montgomery multiplication may produce incorrect
        results
        - debian/patches/CVE-2016-7055.patch: fix logic in
          crypto/bn/asm/x86_64-mont.pl.
        - CVE-2016-7055
      * SECURITY UPDATE: DoS via warning alerts
        - debian/patches/CVE-2016-8610.patch: don't allow too many consecutive
          warning alerts in ssl/d1_pkt.c, ssl/s3_pkt.c, ssl/ssl.h,
          ssl/ssl_locl.h.
        - debian/patches/CVE-2016-8610-2.patch: fail if an unrecognised record
          type is received in ssl/s3_pkt.c.
        - CVE-2016-8610
      * SECURITY UPDATE: Truncated packet could crash via OOB read
        - debian/patches/CVE-2017-3731.patch: harden RC4_MD5 cipher in
          crypto/evp/e_rc4_hmac_md5.c.
        - CVE-2017-3731
      * SECURITY UPDATE: BN_mod_exp may produce incorrect results on x86_64
        - debian/patches/CVE-2017-3732.patch: fix carry bug in
          bn_sqr8x_internal in crypto/bn/asm/x86_64-mont5.pl.
        - CVE-2017-3732
    
     -- Marc Deslauriers <email address hidden>  Mon, 30 Jan 2017 10:31:12 -0500
  • openssl (1.0.2g-1ubuntu4.5) xenial-security; urgency=medium
    
      * SECURITY REGRESSION: incomplete fix for CVE-2016-2182 (LP: #1626883)
        - debian/patches/CVE-2016-2182-2.patch: fix off-by-one in overflow
          check in crypto/bn/bn_print.c.
    
     -- Marc Deslauriers <email address hidden>  Fri, 23 Sep 2016 08:00:13 -0400
  • openssl (1.0.2g-1ubuntu4.4) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Pointer arithmetic undefined behaviour
        - debian/patches/CVE-2016-2177.patch: avoid undefined pointer
          arithmetic in ssl/s3_srvr.c, ssl/ssl_sess.c, ssl/t1_lib.c.
        - CVE-2016-2177
      * SECURITY UPDATE: Constant time flag not preserved in DSA signing
        - debian/patches/CVE-2016-2178-*.patch: preserve BN_FLG_CONSTTIME in
          crypto/dsa/dsa_ossl.c.
        - CVE-2016-2178
      * SECURITY UPDATE: DTLS buffered message DoS
        - debian/patches/CVE-2016-2179.patch: fix queue handling in
          ssl/d1_both.c, ssl/d1_clnt.c, ssl/d1_lib.c, ssl/d1_srvr.c,
          ssl/ssl_locl.h.
        - CVE-2016-2179
      * SECURITY UPDATE: OOB read in TS_OBJ_print_bio()
        - debian/patches/CVE-2016-2180.patch: fix text handling in
          crypto/ts/ts_lib.c.
        - CVE-2016-2180
      * SECURITY UPDATE: DTLS replay protection DoS
        - debian/patches/CVE-2016-2181-1.patch: properly handle unprocessed
          records in ssl/d1_pkt.c.
        - debian/patches/CVE-2016-2181-2.patch: protect against replay attacks
          in ssl/d1_pkt.c, ssl/ssl.h, ssl/ssl_err.c.
        - debian/patches/CVE-2016-2181-3.patch: update error code in ssl/ssl.h.
        - CVE-2016-2181
      * SECURITY UPDATE: OOB write in BN_bn2dec()
        - debian/patches/CVE-2016-2182.patch: don't overflow buffer in
          crypto/bn/bn_print.c.
        - CVE-2016-2182
      * SECURITY UPDATE: SWEET32 Mitigation
        - debian/patches/CVE-2016-2183.patch: move DES ciphersuites from HIGH
          to MEDIUM in ssl/s3_lib.c.
        - CVE-2016-2183
      * SECURITY UPDATE: Malformed SHA512 ticket DoS
        - debian/patches/CVE-2016-6302.patch: sanity check ticket length in
          ssl/t1_lib.c.
        - CVE-2016-6302
      * SECURITY UPDATE: OOB write in MDC2_Update()
        - debian/patches/CVE-2016-6303.patch: avoid overflow in
          crypto/mdc2/mdc2dgst.c.
        - CVE-2016-6303
      * SECURITY UPDATE: OCSP Status Request extension unbounded memory growth
        - debian/patches/CVE-2016-6304.patch: remove OCSP_RESPIDs from previous
          handshake in ssl/t1_lib.c.
        - CVE-2016-6304
      * SECURITY UPDATE: Certificate message OOB reads
        - debian/patches/CVE-2016-6306-1.patch: check lengths in ssl/s3_clnt.c,
          ssl/s3_srvr.c.
        - debian/patches/CVE-2016-6306-2.patch: make message buffer slightly
          larger in ssl/d1_both.c, ssl/s3_both.c.
        - CVE-2016-6306
    
     -- Marc Deslauriers <email address hidden>  Thu, 22 Sep 2016 08:22:22 -0400
  • openssl (1.0.2g-1ubuntu4.3) xenial; urgency=medium
    
      * Remove incomplete FIPS patches for now. (LP: #1614210)
        (related bugs: LP: #1594748, LP: #1593953, LP: #1591797, LP: #1588524)
        - debian/patches/*fips*.patch: removed.
        - debian/rules: removed fips from CONFARGS.
    
     -- Marc Deslauriers <email address hidden>  Fri, 19 Aug 2016 13:03:55 -0400
  • openssl (1.0.2g-1ubuntu4.2) xenial; urgency=medium
    
      * Cherry-pick s390x assembly pack bugfix to cache capability query
        results for improved performance. LP: #1601836.
      * Enable asm optimisations on s390x. LP: #1602655.
    
     -- Dimitri John Ledkov <email address hidden>  Thu, 28 Jul 2016 15:37:07 +0300
  • openssl (1.0.2g-1ubuntu4.1) xenial-security; urgency=medium
    
      * SECURITY UPDATE: EVP_EncodeUpdate overflow
        - debian/patches/CVE-2016-2105.patch: properly check lengths in
          crypto/evp/encode.c, add documentation to
          doc/crypto/EVP_EncodeInit.pod, doc/crypto/evp.pod.
        - CVE-2016-2105
      * SECURITY UPDATE: EVP_EncryptUpdate overflow
        - debian/patches/CVE-2016-2106.patch: fix overflow in
          crypto/evp/evp_enc.c.
        - CVE-2016-2106
      * SECURITY UPDATE: Padding oracle in AES-NI CBC MAC check
        - debian/patches/CVE-2016-2107.patch: check that there are enough
          padding characters in crypto/evp/e_aes_cbc_hmac_sha1.c,
          crypto/evp/e_aes_cbc_hmac_sha256.c.
        - CVE-2016-2107
      * SECURITY UPDATE: Memory corruption in the ASN.1 encoder
        - debian/patches/CVE-2016-2108.patch: fix ASN1_INTEGER handling in
          crypto/asn1/a_type.c, crypto/asn1/asn1.h, crypto/asn1/tasn_dec.c,
          crypto/asn1/tasn_enc.c.
        - CVE-2016-2108
      * SECURITY UPDATE: ASN.1 BIO excessive memory allocation
        - debian/patches/CVE-2016-2109.patch: properly handle large amounts of
          data in crypto/asn1/a_d2i_fp.c.
        - CVE-2016-2109
    
     -- Marc Deslauriers <email address hidden>  Thu, 28 Apr 2016 09:15:39 -0400
  • openssl (1.0.2g-1ubuntu4) xenial; urgency=medium
    
      * Rename Fedora-imported FIPS patches to the names they have in Fedora, add
        correct "Origin:" tags, and move Ubuntu modifications in them into
        openssl-1.0.2g-ubuntu-fips-cleanup.patch.
    
     -- Joy Latten <email address hidden>  Fri, 15 Apr 2016 06:58:01 +0200
  • openssl (1.0.2g-1ubuntu3) xenial; urgency=medium
    
      * Add fips support to openssl, LP: #1553309
        - debian/patches/openssl-1.0.2g-fips.patch: [PATCH 1/6] Add selftest, fips
          support, crypto compliance and define OPENSSL_FIPS.
        - debian/patches/openssl-1.0.2g-fips-ec.patch: [PATCH 2/6] Add fips compliance
          for EC curves.
        - debian/patches/openssl-1.0.2g-fips-md5-allow.patch: [PATCH 3/6] Allow md5 in
          fips mode.
        - debian/patches/openssl-1.0.2g-fips-ctor.patch: [PATCH 4/6] Re-factor integrity
          check for fips mode.
        - debian/patches/openssl-1.0.2g-new-fips-reqs.patch: [PATCH 5/6] New fips
          requirements.
        - debian/patches/openssl-1.0.2g-ubuntu-fips-cleanup.patch: [PATCH 6/6] Cleanup
          compiler warnings, use upstream error codes, DSA, DSA2, fips_utl.h; add
          additional upstream tests to fips_test_suite; allow all EC curves.
    
     -- Joy Latten <email address hidden>  Tue, 12 Apr 2016 15:33:50 -0500
  • openssl (1.0.2g-1ubuntu2) xenial; urgency=medium
    
      * debian/patches/arm64-aarch64_asm.patch: Enable aarch64 asm routines
        (LP: #1552939).
    
     -- dann frazier <email address hidden>  Mon, 07 Mar 2016 10:03:26 -0700
  • openssl (1.0.2g-1ubuntu1) xenial; urgency=medium
    
      * Merge with Debian, remaining changes.
        - Disable SSLv3 without changing ABI:
          + debian/patches/no-sslv3.patch: Disable SSLv3 without using the
            no-ssl3-method option
          + debian/rules: don't use no-ssl3-method, don't bump soname
          + debian/patches/engines-path.patch: don't bump soname
          + debian/patches/version-script.patch: don't bump soname
          + debian/patches/soname.patch: removed
          + debian/lib*: don't bump soname
        - debian/control: don't enable rfc3779 and cms support for now as it
          changes ABI.
        - debian/libssl1.0.0.postinst:
          + Display a system restart required notification on libssl1.0.0
            upgrade on servers.
          + Use a different priority for libssl1.0.0/restart-services depending
            on whether a desktop, or server dist-upgrade is being performed.
        - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
          libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
          in Debian).
        - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
          rules}: Move runtime libraries to /lib, for the benefit of
          wpasupplicant.
        - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
          .pc.
        - debian/rules:
          + Don't run 'make test' when cross-building.
          + Use host compiler when cross-building.  Patch from Neil Williams.
          + Don't build for processors no longer supported: i586 (on i386)
          + Fix Makefile to properly clean up libs/ dirs in clean target.
          + Replace duplicate files in the doc directory with symlinks.
        - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
        - debian/rules: Enable optimized 64bit elliptic curve code contributed
          by Google.
    
    openssl (1.0.2g-1) unstable; urgency=high
    
      * New upstream version
      * Fix CVE-2016-0797
      * Fix CVE-2016-0798
      * Fix CVE-2016-0799
      * Fix CVE-2016-0702
      * Fix CVE-2016-0705
      * Disable EXPORT and LOW ciphers: The DROWN attack (CVE-2016-0800)
        makes use of those, and SLOTH attack (CVE-2015-7575) can make use of them
        too.
    
     -- Marc Deslauriers <email address hidden>  Tue, 01 Mar 2016 14:09:30 -0500
  • openssl (1.0.2f-2ubuntu1) xenial; urgency=medium
    
      * Merge with Debian, remaining changes.
        - Disable SSLv3 without changing ABI:
          + debian/patches/no-sslv3.patch: Disable SSLv3 without using the
            no-ssl3-method option
          + debian/rules: don't use no-ssl3-method, don't bump soname
          + debian/patches/engines-path.patch: don't bump soname
          + debian/patches/version-script.patch: don't bump soname
          + debian/patches/soname.patch: removed
          + debian/lib*: don't bump soname
        - debian/control: don't enable rfc3779 and cms support for now as it
          changes ABI.
        - debian/libssl1.0.0.postinst:
          + Display a system restart required notification on libssl1.0.0
            upgrade on servers.
          + Use a different priority for libssl1.0.0/restart-services depending
            on whether a desktop, or server dist-upgrade is being performed.
        - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
          libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
          in Debian).
        - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
          rules}: Move runtime libraries to /lib, for the benefit of
          wpasupplicant.
        - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
          .pc.
        - debian/rules:
          + Don't run 'make test' when cross-building.
          + Use host compiler when cross-building.  Patch from Neil Williams.
          + Don't build for processors no longer supported: i586 (on i386)
          + Fix Makefile to properly clean up libs/ dirs in clean target.
          + Replace duplicate files in the doc directory with symlinks.
        - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
        - debian/rules: Enable optimized 64bit elliptic curve code contributed
          by Google.
      * debian/patches/CVE-2016-0701.patch: dropped, upstream.
    
    openssl (1.0.2f-2) unstable; urgency=high
    
      * New upstream version.
        - Fixes CVE-2016-0701
        - Not affected by CVE-2015-3197 because SSLv2 is disabled.
    
     -- Marc Deslauriers <email address hidden>  Tue, 02 Feb 2016 13:37:21 -0500
  • openssl (1.0.2e-1ubuntu2) xenial; urgency=medium
    
      * SECURITY UPDATE: DH small subgroups issue
        - debian/patches/CVE-2016-0701.patch: add a test for small subgroup
          attacks in crypto/dh/dhtest.c, always generate DH keys for ephemeral
          DH cipher suites in doc/ssl/SSL_CTX_set_tmp_dh_callback.pod,
          ssl/s3_lib.c, ssl/s3_srvr.c, ssl/ssl.h, prevent small subgroup
          attacks on DH/DHE in crypto/dh/dh.h, crypto/dh/dh_check.c.
        - CVE-2016-0701
    
     -- Marc Deslauriers <email address hidden>  Mon, 25 Jan 2016 13:39:46 -0500
  • openssl (1.0.2e-1ubuntu1) xenial; urgency=medium
    
      * Merge with Debian, remaining changes.
        - Disable SSLv3 without changing ABI:
          + debian/patches/no-sslv3.patch: Disable SSLv3 without using the
            no-ssl3-method option
          + debian/rules: don't use no-ssl3-method, don't bump soname
          + debian/patches/engines-path.patch: don't bump soname
          + debian/patches/version-script.patch: don't bump soname
          + debian/patches/soname.patch: removed
          + debian/lib*: don't bump soname
        - debian/control: don't enable rfc3779 and cms support for now as it
          changes ABI.
        - debian/libssl1.0.0.postinst:
          + Display a system restart required notification on libssl1.0.0
            upgrade on servers.
          + Use a different priority for libssl1.0.0/restart-services depending
            on whether a desktop, or server dist-upgrade is being performed.
        - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
          libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
          in Debian).
        - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
          rules}: Move runtime libraries to /lib, for the benefit of
          wpasupplicant.
        - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
          .pc.
        - debian/rules:
          + Don't run 'make test' when cross-building.
          + Use host compiler when cross-building.  Patch from Neil Williams.
          + Don't build for processors no longer supported: i586 (on i386)
          + Fix Makefile to properly clean up libs/ dirs in clean target.
          + Replace duplicate files in the doc directory with symlinks.
        - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
        - debian/rules: Enable optimized 64bit elliptic curve code contributed
          by Google.
    
    openssl (1.0.2e-1) unstable; urgency=high
    
      * New upstream release
        - Fix CVE-2015-3193
        - Fix CVE-2015-3194
        - Fix CVE-2015-3195
        - Fix CVE-2015-3196
      * Remove all symlinks during clean
      * Run make depend after configure
      * Remove openssl_button.* from the doc package
    
    openssl (1.0.2d-3) unstable; urgency=medium
    
      * Upload to unstable
    
    openssl (1.0.2d-2) experimental; urgency=medium
    
      * Build with no-ssl3-method to remove all SSLv3 support.  This results in
        the functions SSLv3_method(), SSLv3_server_method() and
        SSLv3_client_method() being removed from libssl.  Change the soname as
        result of that and also changes name of the binary package.
        (Closes: #768476)
      * Enable rfc3779 and cms support (Closes: #630790)
      * Fix cross compilation for mips architectures. (Closes: #782492)
    
    openssl (1.0.2d-1) unstable; urgency=high
    
      * New upstream version
        - Fixes CVE-2015-1793
    
     -- Marc Deslauriers <email address hidden>  Fri, 04 Dec 2015 08:24:39 -0500
  • openssl (1.0.2d-0ubuntu2) xenial; urgency=medium
    
      * debian/patches/no-sslv3.patch: Disable SSLv3 without using the
        no-ssl3-method option, as that changes ABI and we don't want to break
        compatibility with third party applications and applications built for
        older versions of Ubuntu, especially for an LTS release.
    
     -- Marc Deslauriers <email address hidden>  Mon, 09 Nov 2015 17:37:38 -0500
  • openssl (1.0.2d-0ubuntu1) wily; urgency=medium
    
      * SECURITY UPDATE: alternative chains certificate forgery
        - Updated to new upstream version
        - CVE-2015-1793
    
     -- Marc Deslauriers <email address hidden>  Thu, 09 Jul 2015 09:27:48 -0400