CVSROOT:        /cvs
Module name:    ports
Changes by:     [email protected]    2023/02/07 09:22:36

Modified files:
        security/openssl/1.1: Makefile distinfo 
        security/openssl/1.1/pkg: PLIST 
Added files:
        security/openssl/1.1/patches: patch-crypto_bn_build_info 
                                      patch-crypto_rsa_rsa_ossl_c 

Log message:
Update to OpenSSL 1.1.1t

X.400 address type confusion in X.509 GeneralName (CVE-2023-0286)
Use-after-free following BIO_new_NDEF (CVE-2023-0215)
Double free after calling PEM_read_bio_ex (CVE-2022-4450)

After discussing with jsing, we decided that it's best to neuter the "fix" for

Timing Oracle in RSA Decryption (CVE-2022-4304)

for the time being. The upstream patch is ~700 lines of strange code without
license and with barely decipherable comments - initial versions sported
several variants of "mongomery". Testers found issues on aarch64... Even by
OpenSSL standards this is badly written and manifestly poorly tested code.
It is irresponsible to subject users to this in a security update before it
has seen more testing.

Reply via email to