ubuntu/+source/openssl:ubuntu/precise-proposed

Last commit made on 2015-03-05
Get this branch:
git clone -b ubuntu/precise-proposed https://git.launchpad.net/ubuntu/+source/openssl
Members of Ubuntu Server Dev import team can upload to this branch. Log in for directions.

Branch merges

Branch information

Name:
ubuntu/precise-proposed
Repository:
lp:ubuntu/+source/openssl

Recent commits

bfe7ffd... by Marc Deslauriers on 2015-02-26

Import patches-unapplied version 1.0.1-4ubuntu5.22 to ubuntu/precise-proposed

Imported using git-ubuntu import.

Changelog parent: 9198b637edf316f39b0308698aa0b73b23d2cd5a

New changelog entries:
  * Fix DTLS handshake on amd64 (LP: #1425914)
    - debian/patches/lp1425914.patch: backport upstream patch that fixes
      alignment issue causing an assert in ssl/ssl_ciph.c.

9198b63... by Marc Deslauriers on 2015-01-09

Import patches-unapplied version 1.0.1-4ubuntu5.21 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 8295a6de07af6fa492ca47f67acd8738eb4c10ad

New changelog entries:
  * SECURITY UPDATE: denial of service via unexpected handshake when
    no-ssl3 build option is used (not the default)
    - debian/patches/CVE-2014-3569.patch: keep the old method for now in
      ssl/s23_srvr.c.
    - CVE-2014-3569
  * SECURITY UPDATE: bignum squaring may produce incorrect results
    - debian/patches/CVE-2014-3570.patch: fix bignum logic in
      crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c,
      crypto/bn/bn_asm.c, removed crypto/bn/asm/mips3.s, added test to
      crypto/bn/bntest.c.
    - CVE-2014-3570
  * SECURITY UPDATE: DTLS segmentation fault in dtls1_get_record
    - debian/patches/CVE-2014-3571-1.patch: fix crash in ssl/d1_pkt.c,
      ssl/s3_pkt.c.
    - debian/patches/CVE-2014-3571-2.patch: make code more obvious in
      ssl/d1_pkt.c.
    - CVE-2014-3571
  * SECURITY UPDATE: ECDHE silently downgrades to ECDH [Client]
    - debian/patches/CVE-2014-3572.patch: don't skip server key exchange in
      ssl/s3_clnt.c.
    - CVE-2014-3572
  * SECURITY UPDATE: certificate fingerprints can be modified
    - debian/patches/CVE-2014-8275.patch: fix various fingerprint issues in
      crypto/asn1/a_bitstr.c, crypto/asn1/a_type.c, crypto/asn1/a_verify.c,
      crypto/asn1/asn1.h, crypto/asn1/asn1_err.c, crypto/asn1/x_algor.c,
      crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, crypto/x509/x509.h,
      crypto/x509/x_all.c.
    - CVE-2014-8275
  * SECURITY UPDATE: RSA silently downgrades to EXPORT_RSA [Client]
    - debian/patches/CVE-2015-0204.patch: only allow ephemeral RSA keys in
      export ciphersuites in ssl/d1_srvr.c, ssl/s3_clnt.c, ssl/s3_srvr.c,
      ssl/ssl.h, adjust documentation in doc/ssl/SSL_CTX_set_options.pod,
      doc/ssl/SSL_CTX_set_tmp_rsa_callback.pod.
    - CVE-2015-0204
  * SECURITY UPDATE: DTLS memory leak in dtls1_buffer_record
    - debian/patches/CVE-2015-0206.patch: properly handle failures in
      ssl/d1_pkt.c.
    - CVE-2015-0206
  * debian/patches/CVE-2015-0205.patch: fix code to prevent confusion in
      ssl/s3_srvr.c.

8295a6d... by Marc Deslauriers on 2014-10-15

Import patches-unapplied version 1.0.1-4ubuntu5.20 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: afa1bb4d9b6f427ba0659b6ae93a7fb27ad425f2

New changelog entries:
  * SECURITY UPDATE: denial of service via DTLS SRTP memory leak
    - debian/patches/CVE-2014-3513.patch: fix logic in ssl/d1_srtp.c,
      ssl/srtp.h, ssl/t1_lib.c, util/mk1mf.pl, util/mkdef.pl,
      util/ssleay.num.
    - CVE-2014-3513
  * SECURITY UPDATE: denial of service via session ticket integrity check
    memory leak
    - debian/patches/CVE-2014-3567.patch: perform cleanup in ssl/t1_lib.c.
    - CVE-2014-3567
  * SECURITY UPDATE: fix the no-ssl3 build option
    - debian/patches/CVE-2014-3568.patch: fix conditional code in
      ssl/s23_clnt.c, ssl/s23_srvr.c.
    - CVE-2014-3568
  * SECURITY IMPROVEMENT: Added TLS_FALLBACK_SCSV support to mitigate a
    protocol downgrade attack to SSLv3 that exposes the POODLE attack.
    - debian/patches/tls_fallback_scsv_support.patch: added support for
      TLS_FALLBACK_SCSV in apps/s_client.c, crypto/err/openssl.ec,
      ssl/d1_lib.c, ssl/dtls1.h, ssl/s23_clnt.c, ssl/s23_srvr.c,
      ssl/s2_lib.c, ssl/s3_enc.c, ssl/s3_lib.c, ssl/ssl.h, ssl/ssl3.h,
      ssl/ssl_err.c, ssl/ssl_lib.c, ssl/t1_enc.c, ssl/tls1.h,
      doc/apps/s_client.pod, doc/ssl/SSL_CTX_set_mode.pod.

afa1bb4... by Marc Deslauriers on 2014-10-01

Import patches-unapplied version 1.0.1-4ubuntu5.18 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 357eb8bbf715cddc4477a38d0bd1efff89162ec9

New changelog entries:
  * SECURITY IMPROVEMENT: remove cipher length limitation that was set to
    work around problematic servers when using TLSv1.2 back in 2012.
    (LP: #1376447)
    - Although TLSv1.2 is disabled for clients by default, forcing it
      enabled would truncate the cipher list, possibly removing important
      ciphers, and was also breaking secure renegotiations.
    - debian/patches/tls12_workarounds.patch: remove
      OPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50 from Configure.

357eb8b... by Marc Deslauriers on 2014-08-07

Import patches-unapplied version 1.0.1-4ubuntu5.17 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: b1778342b07fd5c89bfaa41711c41826868adda5

New changelog entries:
  * SECURITY UPDATE: double free when processing DTLS packets
    - debian/patches/CVE-2014-3505.patch: fix double free in ssl/d1_both.c.
    - CVE-2014-3505
  * SECURITY UPDATE: DTLS memory exhaustion
    - debian/patches/CVE-2014-3506.patch: fix DTLS handshake message size
      checks in ssl/d1_both.c.
    - CVE-2014-3506
  * SECURITY UPDATE: DTLS memory leak from zero-length fragments
    - debian/patches/CVE-2014-3507.patch: fix memory leak and return codes
      in ssl/d1_both.c.
    - CVE-2014-3507
  * SECURITY UPDATE: information leak in pretty printing functions
    - debian/patches/CVE-2014-3508.patch: fix OID handling in
      crypto/asn1/a_object.c, crypto/objects/obj_dat.c.
    - CVE-2014-3508
  * SECURITY UPDATE: race condition in ssl_parse_serverhello_tlsext
    - debian/patches/CVE-2014-3509.patch: fix race in ssl/t1_lib.c.
    - CVE-2014-3509
  * SECURITY UPDATE: DTLS anonymous EC(DH) denial of service
    - debian/patches/CVE-2014-3510.patch: check for server certs in
      ssl/d1_clnt.c, ssl/s3_clnt.c.
    - CVE-2014-3510
  * SECURITY UPDATE: TLS protocol downgrade attack
    - debian/patches/CVE-2014-3511.patch: properly handle fragments in
      ssl/s23_srvr.c.
    - CVE-2014-3511
  * SECURITY UPDATE: SRP buffer overrun
    - debian/patches/CVE-2014-3512.patch: check parameters in
      crypto/srp/srp_lib.c.
    - CVE-2014-3512
  * SECURITY UPDATE: crash with SRP ciphersuite in Server Hello message
    - debian/patches/CVE-2014-5139.patch: fix SRP authentication and make
      sure ciphersuite is set up correctly in ssl/s3_clnt.c, ssl/ssl_lib.c,
      ssl/s3_lib.c, ssl/ssl.h, ssl/ssl_ciph.c, ssl/ssl_locl.h.
    - CVE-2014-5139

b177834... by Marc Deslauriers on 2014-06-20

Import patches-unapplied version 1.0.1-4ubuntu5.16 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: fc14a9482af54b441b8518468a0948af981d93c7

New changelog entries:
  * SECURITY UPDATE: regression with certain renegotiations (LP: #1332643)
    - debian/patches/CVE-2014-0224-regression2.patch: accept CCS after
      sending finished ssl/s3_clnt.c.

fc14a94... by Marc Deslauriers on 2014-06-12

Import patches-unapplied version 1.0.1-4ubuntu5.15 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 85800c1187049ba14b5cdace46e06c31389f21aa

New changelog entries:
  * SECURITY UPDATE: regression with tls_session_secret_cb (LP: #1329297)
    - debian/patches/CVE-2014-0224.patch: set the CCS_OK flag when using
      tls_session_secret_cb for session resumption in ssl/s3_clnt.c.

85800c1... by Marc Deslauriers on 2014-06-02

Import patches-unapplied version 1.0.1-4ubuntu5.14 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: c41f2087ef8aa6c281f1c7c10b08b9a818913426

New changelog entries:
  * SECURITY UPDATE: arbitrary code execution via DTLS invalid fragment
    - debian/patches/CVE-2014-0195.patch: add consistency check for DTLS
      fragments in ssl/d1_both.c.
    - CVE-2014-0195
  * SECURITY UPDATE: denial of service via DTLS recursion flaw
    - debian/patches/CVE-2014-0221.patch: handle DTLS hello request without
      recursion in ssl/d1_both.c.
    - CVE-2014-0221
  * SECURITY UPDATE: MITM via change cipher spec
    - debian/patches/CVE-2014-0224-1.patch: only accept change cipher spec
      when it is expected in ssl/s3_clnt.c, ssl/s3_pkt.c, ssl/s3_srvr.c,
      ssl/ssl3.h.
    - debian/patches/CVE-2014-0224-2.patch: don't accept zero length master
      secrets in ssl/s3_pkt.c.
    - debian/patches/CVE-2014-0224-3.patch: allow CCS after resumption in
      ssl/s3_clnt.c.
    - CVE-2014-0224
  * SECURITY UPDATE: denial of service via ECDH null session cert
    - debian/patches/CVE-2014-3470.patch: check session_cert is not NULL
      before dereferencing it in ssl/s3_clnt.c.
    - CVE-2014-3470

c41f208... by Marc Deslauriers on 2014-05-02

Import patches-unapplied version 1.0.1-4ubuntu5.13 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 91148a8e8ff1a0fee1f18a4c802361245891ec9d

New changelog entries:
  * SECURITY UPDATE: denial of service via use after free
    - debian/patches/CVE-2010-5298.patch: check s->s3->rbuf.left before
      releasing buffers in ssl/s3_pkt.c.
    - CVE-2010-5298
  * SECURITY UPDATE: denial of service via null pointer dereference
    - debian/patches/CVE-2014-0198.patch: if buffer was released, get a new
      one in ssl/s3_pkt.c.
    - CVE-2014-0198

91148a8... by Marc Deslauriers on 2014-04-07

Import patches-unapplied version 1.0.1-4ubuntu5.12 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 62524dc8b5b85bd52379734b9ef62a5541291285

New changelog entries:
  * SECURITY UPDATE: side-channel attack on Montgomery ladder implementation
    - debian/patches/CVE-2014-0076.patch: add and use constant time swap in
      crypto/bn/bn.h, crypto/bn/bn_lib.c, crypto/ec/ec2_mult.c,
      util/libeay.num.
    - CVE-2014-0076
  * SECURITY UPDATE: memory disclosure in TLS heartbeat extension
    - debian/patches/CVE-2014-0160.patch: use correct lengths in
      ssl/d1_both.c, ssl/t1_lib.c.
    - CVE-2014-0160