[openssl-commits] Build failed: openssl OpenSSL_1_0_2-stable.81
Build openssl OpenSSL_1_0_2-stable.81 failed Commit babe434c99 by Andy Polyakov on 12/3/2015 12:31 PM: perlasm/ppc-xlate.pl: comply with ABIs that specify vrsave as reserved. Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build failed: openssl master.82
Build openssl master.82 failed Commit 85a9398323 by oezgan on 12/3/2015 1:34 PM: Fix for Error #4148 (PKCS1 type 1 padding check) Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] OpenSSL_1_0_1-stable update
The branch OpenSSL_1_0_1-stable has been updated via 005f4893dc770d77eb07a098da32e0fca87f07b6 (commit) from d585cc32a55e65573051225b29dc62171f59e05a (commit) - Log - commit 005f4893dc770d77eb07a098da32e0fca87f07b6 Author: Andy PolyakovDate: Thu Dec 3 12:29:49 2015 +0100 e_os.h: limit _MSC_VER trickery to older compilers. PR: #3390, backport from 1.0.2. Reviewed-by: Matt Caswell --- Summary of changes: e_os.h | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/e_os.h b/e_os.h index c9c7aaf..76c471e 100644 --- a/e_os.h +++ b/e_os.h @@ -315,7 +315,7 @@ static __inline unsigned int _strlen31(const char *str) #undef isxdigit # endif # if defined(_MSC_VER) && !defined(_DLL) && defined(stdin) -#if _MSC_VER>=1300 +#if _MSC_VER>=1300 && _MSC_VER<1600 # undef stdin # undef stdout # undef stderr @@ -323,7 +323,7 @@ FILE *__iob_func(); # define stdin (&__iob_func()[0]) # define stdout (&__iob_func()[1]) # define stderr (&__iob_func()[2]) -#elif defined(I_CAN_LIVE_WITH_LNK4049) +#elif _MSC_VER<1300 && defined(I_CAN_LIVE_WITH_LNK4049) # undef stdin # undef stdout # undef stderr _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] OpenSSL_1_0_2-stable update
The branch OpenSSL_1_0_2-stable has been updated via fb4f46763fed3c600db21974577061b611b6fa46 (commit) from babe434c99251cd1e3c84d6906f579509343186c (commit) - Log - commit fb4f46763fed3c600db21974577061b611b6fa46 Author: Richard LevitteDate: Thu Dec 3 15:20:10 2015 +0100 Add cleanup of *.s Reviewed-by: Matt Caswell --- Summary of changes: crypto/ec/Makefile | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/crypto/ec/Makefile b/crypto/ec/Makefile index 359ef4e..8949145 100644 --- a/crypto/ec/Makefile +++ b/crypto/ec/Makefile @@ -89,7 +89,7 @@ dclean: mv -f Makefile.new $(MAKEFILE) clean: - rm -f *.o */*.o *.obj lib tags core .pure .nfs* *.old *.bak fluff + rm -f *.s *.o */*.o *.obj lib tags core .pure .nfs* *.old *.bak fluff # DO NOT DELETE THIS LINE -- make depend depends on it. _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] OpenSSL_0_9_8zh create
The annotated tag OpenSSL_0_9_8zh has been created at f9022119ae9267abd57e70a2b53f27925df77c39 (tag) tagging c2ef67100cd0ca2321b5f1a437abb93fc7e11e37 (commit) replaces OpenSSL_0_9_8zg tagged by Matt Caswell on Thu Dec 3 15:00:17 2015 + - Log - OpenSSL 0.9.8zh release tag Dr. Stephen Henson (6): document -2 return value Don't try and parse boolean type. Typo. Limit depth of ASN1 parse printing. Fix uninitialised p error. Fix leak with ASN.1 combine. Matt Caswell (5): Prepare for 0.9.8zh-dev Fix building with OPENSSL_NO_TLSEXT. Make sure OPENSSL_cleanse checks for NULL Update CHANGES and NEWS Prepare for 0.9.8zh release Rich Salz (5): Tweak README about rt and bug reporting. Move FAQ to the web. GH398: Add mingw cross-compile, etc. Remove stricts-warnings on 0.9.8 travis. Change --debug to -d for compat with old releases. Richard Levitte (8): Stop using tardy Set numeric IDs for tar as well Add emacs CC mode style for OpenSSL Add an example .dir-locals.el Remove auto-fill-mode Ignore .dir-locals.el OpenSSL 0.9.8 doesn't have support for mingw64 _BSD_SOURCE is deprecated, use _DEFAULT_SOURCE instead --- _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] OpenSSL_1_0_1q create
The annotated tag OpenSSL_1_0_1q has been created at 075c0103d9e098bb44507e552e3dc45a13b8ce0f (tag) tagging 55615e8d48a4ddd684fcbfc7ba6523ed6414c8fc (commit) replaces OpenSSL_1_0_1p tagged by Matt Caswell on Thu Dec 3 14:50:26 2015 + - Log - OpenSSL 1.0.1q release tag Adam Eijdenberg (1): Clarify return values for EVP_DigestVerifyFinal. Alessandro Ghedini (11): Make BUF_strndup() read-safe on arbitrary inputs Validate ClientHello extension field length Do not treat 0 return value from BIO_get_fd() as error Replace malloc+strlcpy with strdup Fix memory leaks and other mistakes on errors Set salt length after the malloc has succeeded Fix typos Fix references to various RFCs Check memory allocation Remove useless code Add initial AppVeyor configuration Andy Polyakov (1): e_os.h: limit _MSC_VER trickery to older compilers. Ben Kaduk (1): GH367 follow-up, for more clarity David Brodski (1): Fixed problem with multiple load-unload of comp zlib David Woodhouse (1): RT3479: Add UTF8 support to BIO_read_filename() Dirk Wetter (1): GH336: Return an exit code if report fails Dr. Stephen Henson (19): Sort @sstacklst correctly. use X9.31 keygen by default in FIPS mode Err isn't always malloc failure. Fix memory leak if setup fails. Return error for unsupported modes. Update docs. Use default field separator. Check for FIPS mode after loading config. Handle SSL_ERROR_WANT_X509_LOOKUP Make SRP work with -www SRP memory leak fix Link in applink with fips_premain_dso Don't try and parse boolean type. Typo. Limit depth of ASN1 parse printing. Fix uninitialised p error. typo Fix leak with ASN.1 combine. Add PSS parameter check. Emilia Kasper (11): bntest: don't dereference the |d| array for a zero BIGNUM. BN_mod_exp_mont_consttime: check for zero modulus. RT 3493: fix RSA test RT4002: check for NULL cipher in p12_crpt.c OpenSSL 1.0.1n: add missing CHANGES entry RT3754: check for NULL pointer RT3757: base64 encoding bugs base64 decode: check for high bit BUF_strndup: tidy BUF_strdup and friends: update docs RT2772: accept empty SessionTicket Ernie Hershey (1): GH322: Fix typo in generated comment. GitHub User (1): Missing perldoc markup around < literal Graeme Perrow (1): RT32671: wrong multiple errs TS_check_status_info Gunnar Kudrjavets (1): RT3823: Improve the robustness of event logging Guy Leaver (guleaver) (1): Fix seg fault with 0 p val in SKE Hubert Kario (1): RT4051: fix ciphers man page typo Ismo Puustinen (2): GH367: Fix dsa keygen for too-short seed GH367: use random data if seed too short. Ivo Raisr (1): Make no-psk compile without warnings. Kurt Roeckx (5): d2i: don't update input pointer on failure Fix more d2i cases to properly update the input pointer Use defined(__sun) instead of defined(sun) Set reference count earlier Use both sun and __sun Loganaden Velvindron (1): Clear BN-mont values when free'ing it. Marcus Meissner (1): mark openssl configuration as loaded at end of OPENSSL_config Markus Rinne (1): RT4019: Duplicate -hmac flag in dgst.pod Martin Vejnar (1): RT3774: double-free in DSA Matt Caswell (24): Prepare for 1.0.1q-dev Add test for SSL_set_session_ticket_ext Fix SSL_set_session_ticket_ext when used with SSLv23_method Fix warning when compiling with no-ec2m Check for 0 modulus in BN_MONT_CTX_set Fix missing return value checks in SCTP Fix "make test" seg fault with SCTP enabled Fix DTLS session ticket renewal Fix building with OPENSSL_NO_TLSEXT. Fix session resumption Make sure OPENSSL_cleanse checks for NULL Fix SRP memory leaks Change functions to pass in a limit rather than calculate it Don't treat a bare OCTETSTRING as DigestInfo in int_rsa_verify Clarify the preferred way of creating patch files Minor EVP_SignInit_ex doc fix Fix missing malloc return value checks Only call ssl3_init_finished_mac once for DTLS Stop DTLS servers asking for unsafe legacy renegotiation Ensure all EVP calls have their returns checked where appropriate Return errors even if the cookie validation has succeeded Update CHANGES and NEWS make update Prepare for 1.0.1q release Pascal Cuoq (4): Set flags to 0 before calling BN_with_flags() Move BN_CTX_start() call so the error case can always call BN_CTX_end(). BN_GF2m_mod_inv(): check bn_wexpand return value ssl3_free(): Return if it wasn't created Peter Waltenberg (1): Exit on error in ecparam
[openssl-commits] [openssl] OpenSSL_0_9_8-stable update
The branch OpenSSL_0_9_8-stable has been updated via 74743418dca737ff584530470c54d1a7061e7e0a (commit) via c2ef67100cd0ca2321b5f1a437abb93fc7e11e37 (commit) via 35c8d0d85fe71e41eb990655b249e398c7fd1435 (commit) via 2cdafc51f008e65b2d5263a80ad0e89e9b56c8d3 (commit) from e979e4715f3795cb59fcf46c77e7c714a184edd8 (commit) - Log - commit 74743418dca737ff584530470c54d1a7061e7e0a Author: Matt CaswellDate: Thu Dec 3 15:00:54 2015 + Prepare for 0.9.8zi-dev Reviewed-by: Richard Levitte commit c2ef67100cd0ca2321b5f1a437abb93fc7e11e37 Author: Matt Caswell Date: Thu Dec 3 15:00:17 2015 + Prepare for 0.9.8zh release Reviewed-by: Richard Levitte commit 35c8d0d85fe71e41eb990655b249e398c7fd1435 Author: Matt Caswell Date: Tue Dec 1 14:39:47 2015 + Update CHANGES and NEWS Update the CHANGES and NEWS files for the new release. Reviewed-by: Rich Salz commit 2cdafc51f008e65b2d5263a80ad0e89e9b56c8d3 Author: Dr. Stephen Henson Date: Tue Nov 10 19:03:07 2015 + Fix leak with ASN.1 combine. When parsing a combined structure pass a flag to the decode routine so on error a pointer to the parent structure is not zeroed as this will leak any additional components in the parent. This can leak memory in any application parsing PKCS#7 or CMS structures. CVE-2015-3195. Thanks to Adam Langley (Google/BoringSSL) for discovering this bug using libFuzzer. PR#4131 Reviewed-by: Richard Levitte --- Summary of changes: CHANGES| 16 +++- NEWS | 6 +- README | 2 +- crypto/asn1/tasn_dec.c | 7 +-- crypto/opensslv.h | 6 +++--- openssl.spec | 2 +- 6 files changed, 30 insertions(+), 9 deletions(-) diff --git a/CHANGES b/CHANGES index ed2f0ec..d3f43af 100644 --- a/CHANGES +++ b/CHANGES @@ -2,10 +2,24 @@ OpenSSL CHANGES ___ - Changes between 0.9.8zg and 0.9.8zh [xx XXX ] + Changes between 0.9.8zh and 0.9.8zi [xx XXX ] *) + Changes between 0.9.8zg and 0.9.8zh [3 Dec 2015] + + *) X509_ATTRIBUTE memory leak + + When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak + memory. This structure is used by the PKCS#7 and CMS routines so any + application which reads PKCS#7 or CMS data from untrusted sources is + affected. SSL/TLS is not affected. + + This issue was reported to OpenSSL by Adam Langley (Google/BoringSSL) using + libFuzzer. + (CVE-2015-3195) + [Stephen Henson] + Changes between 0.9.8zf and 0.9.8zg [11 Jun 2015] *) Malformed ECParameters causes infinite loop diff --git a/NEWS b/NEWS index 4ffbbab..f3130d4 100644 --- a/NEWS +++ b/NEWS @@ -5,10 +5,14 @@ This file gives a brief overview of the major changes between each OpenSSL release. For more details please read the CHANGES file. - Major changes between OpenSSL 0.9.8zg and OpenSSL 0.9.8zh [under development] + Major changes between OpenSSL 0.9.8zh and OpenSSL 0.9.8zi [under development] o + Major changes between OpenSSL 0.9.8zg and OpenSSL 0.9.8zh [3 Dec 2015] + + o X509_ATTRIBUTE memory leak (CVE-2015-3195) + Major changes between OpenSSL 0.9.8zf and OpenSSL 0.9.8zg [11 Jun 2015] o Malformed ECParameters causes infinite loop (CVE-2015-1788) diff --git a/README b/README index 4827753..52df8f6 100644 --- a/README +++ b/README @@ -1,5 +1,5 @@ - OpenSSL 0.9.8zh-dev + OpenSSL 0.9.8zi-dev Copyright (c) 1998-2011 The OpenSSL Project Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson diff --git a/crypto/asn1/tasn_dec.c b/crypto/asn1/tasn_dec.c index 6e4a325..91e7698 100644 --- a/crypto/asn1/tasn_dec.c +++ b/crypto/asn1/tasn_dec.c @@ -178,6 +178,8 @@ int ASN1_item_ex_d2i(ASN1_VALUE **pval, const unsigned char **in, long len, int otag; int ret = 0; ASN1_VALUE **pchptr, *ptmpval; +int combine = aclass & ASN1_TFLG_COMBINE; +aclass &= ~ASN1_TFLG_COMBINE; if (!pval) return 0; if (aux && aux->asn1_cb) @@ -498,7 +500,8 @@ int ASN1_item_ex_d2i(ASN1_VALUE **pval, const unsigned char **in, long len, auxerr: ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, ASN1_R_AUX_ERROR); err: -ASN1_item_ex_free(pval, it); +if (combine == 0) +ASN1_item_ex_free(pval, it); if (errtt) ERR_add_error_data(4, "Field=", errtt->field_name, ", Type=", it->sname); @@ -687,7 +690,7 @@ static int asn1_template_noexp_d2i(ASN1_VALUE **val, } else { /* Nothing special */ ret = ASN1_item_ex_d2i(val, , len,
[openssl-commits] [openssl] OpenSSL_1_0_0-stable update
The branch OpenSSL_1_0_0-stable has been updated via f93aad4a56a1580a109785c2c922fe6b8baf7df9 (commit) via ce052c8437fb97cbc57f034fa94b5bcd749dbf52 (commit) via a402b2b7bcff8d6901aa771e49c45cf38836e7bf (commit) via d275dbe6eb7b720b8920f712eea79044f845a4bb (commit) via cf432b3b1bd7caa22943b41b94ec2472ae497dc6 (commit) from 015b17257855e31003eb29a70280764c3c822710 (commit) - Log - commit f93aad4a56a1580a109785c2c922fe6b8baf7df9 Author: Matt CaswellDate: Thu Dec 3 14:57:35 2015 + Prepare for 1.0.0u-dev Reviewed-by: Richard Levitte commit ce052c8437fb97cbc57f034fa94b5bcd749dbf52 Author: Matt Caswell Date: Thu Dec 3 14:56:22 2015 + Prepare for 1.0.0t release Reviewed-by: Richard Levitte commit a402b2b7bcff8d6901aa771e49c45cf38836e7bf Author: Matt Caswell Date: Tue Dec 1 14:39:47 2015 + Update CHANGES and NEWS Update the CHANGES and NEWS files for the new release. Reviewed-by: Rich Salz commit d275dbe6eb7b720b8920f712eea79044f845a4bb Author: Dr. Stephen Henson Date: Mon Feb 23 12:57:50 2015 + Free up passed ASN.1 structure if reused. Change the "reuse" behaviour in ASN1_item_d2i: if successful the old structure is freed and a pointer to the new one used. If it is not successful then the passed structure is untouched. Exception made for primitive types so ssl_asn1.c still works. Reviewed-by: Tim Hudson Reviewed-by: Emilia Käsper Conflicts: doc/crypto/d2i_X509.pod commit cf432b3b1bd7caa22943b41b94ec2472ae497dc6 Author: Dr. Stephen Henson Date: Tue Nov 10 19:03:07 2015 + Fix leak with ASN.1 combine. When parsing a combined structure pass a flag to the decode routine so on error a pointer to the parent structure is not zeroed as this will leak any additional components in the parent. This can leak memory in any application parsing PKCS#7 or CMS structures. CVE-2015-3195. Thanks to Adam Langley (Google/BoringSSL) for discovering this bug using libFuzzer. PR#4131 Reviewed-by: Richard Levitte --- Summary of changes: CHANGES | 25 - NEWS| 7 ++- README | 2 +- crypto/asn1/tasn_dec.c | 21 +++-- crypto/opensslv.h | 6 +++--- doc/crypto/d2i_X509.pod | 10 +- openssl.spec| 2 +- 7 files changed, 59 insertions(+), 14 deletions(-) diff --git a/CHANGES b/CHANGES index ccf2c03..9cea9e6 100644 --- a/CHANGES +++ b/CHANGES @@ -2,10 +2,33 @@ OpenSSL CHANGES ___ - Changes between 1.0.0s and 1.0.0t [xx XXX ] + Changes between 1.0.0t and 1.0.0u [xx XXX ] *) + Changes between 1.0.0s and 1.0.0t [3 Dec 2015] + + *) X509_ATTRIBUTE memory leak + + When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak + memory. This structure is used by the PKCS#7 and CMS routines so any + application which reads PKCS#7 or CMS data from untrusted sources is + affected. SSL/TLS is not affected. + + This issue was reported to OpenSSL by Adam Langley (Google/BoringSSL) using + libFuzzer. + (CVE-2015-3195) + [Stephen Henson] + + *) Race condition handling PSK identify hint + + If PSK identity hints are received by a multi-threaded client then + the values are wrongly updated in the parent SSL_CTX structure. This can + result in a race condition potentially leading to a double free of the + identify hint data. + (CVE-2015-3196) + [Stephen Henson] + Changes between 1.0.0r and 1.0.0s [11 Jun 2015] *) Malformed ECParameters causes infinite loop diff --git a/NEWS b/NEWS index 99ba960..d688d4b 100644 --- a/NEWS +++ b/NEWS @@ -5,10 +5,15 @@ This file gives a brief overview of the major changes between each OpenSSL release. For more details please read the CHANGES file. - Major changes between OpenSSL 1.0.0s and OpenSSL 1.0.0t [under development] + Major changes between OpenSSL 1.0.0t and OpenSSL 1.0.0u [under development] o + Major changes between OpenSSL 1.0.0s and OpenSSL 1.0.0t [3 Dec 2015] + + o X509_ATTRIBUTE memory leak (CVE-2015-3195) + o Race condition handling PSK identify hint (CVE-2015-3196) + Major changes between OpenSSL 1.0.0r and OpenSSL 1.0.0s [11 Jun 2015] o Malformed ECParameters causes infinite loop (CVE-2015-1788) diff --git a/README b/README index 1a70b7f..f2f62b0 100644 --- a/README +++ b/README @@ -1,5 +1,5 @@ - OpenSSL 1.0.0t-dev + OpenSSL
[openssl-commits] [openssl] OpenSSL_1_0_1-stable update
The branch OpenSSL_1_0_1-stable has been updated via d82626caec9cb3f8da346125434f17eb180d4ef1 (commit) via 55615e8d48a4ddd684fcbfc7ba6523ed6414c8fc (commit) via 56edb20184ac7ea5fec1636a4cae3b8ba5c0d5d1 (commit) via ac3dd9b7e6e2182ae3d1a8dc6c522cef9385f511 (commit) via d8541d7e9e63bf5f343af24644046c8d96498c17 (commit) via b29ffa392e839d05171206523e84909146f7a77c (commit) from 005f4893dc770d77eb07a098da32e0fca87f07b6 (commit) - Log - commit d82626caec9cb3f8da346125434f17eb180d4ef1 Author: Matt CaswellDate: Thu Dec 3 14:51:13 2015 + Prepare for 1.0.1r-dev Reviewed-by: Richard Levitte commit 55615e8d48a4ddd684fcbfc7ba6523ed6414c8fc Author: Matt Caswell Date: Thu Dec 3 14:50:26 2015 + Prepare for 1.0.1q release Reviewed-by: Richard Levitte commit 56edb20184ac7ea5fec1636a4cae3b8ba5c0d5d1 Author: Matt Caswell Date: Thu Dec 3 14:50:26 2015 + make update Reviewed-by: Richard Levitte commit ac3dd9b7e6e2182ae3d1a8dc6c522cef9385f511 Author: Matt Caswell Date: Tue Dec 1 14:39:47 2015 + Update CHANGES and NEWS Update the CHANGES and NEWS files for the new release. Reviewed-by: Richard Levitte commit d8541d7e9e63bf5f343af24644046c8d96498c17 Author: Dr. Stephen Henson Date: Fri Oct 2 13:10:29 2015 +0100 Add PSS parameter check. Avoid seg fault by checking mgf1 parameter is not NULL. This can be triggered during certificate verification so could be a DoS attack against a client or a server enabling client authentication. Thanks to Loïc Jonas Etienne (Qnective AG) for discovering this bug. CVE-2015-3194 Reviewed-by: Matt Caswell commit b29ffa392e839d05171206523e84909146f7a77c Author: Dr. Stephen Henson Date: Tue Nov 10 19:03:07 2015 + Fix leak with ASN.1 combine. When parsing a combined structure pass a flag to the decode routine so on error a pointer to the parent structure is not zeroed as this will leak any additional components in the parent. This can leak memory in any application parsing PKCS#7 or CMS structures. CVE-2015-3195. Thanks to Adam Langley (Google/BoringSSL) for discovering this bug using libFuzzer. PR#4131 Reviewed-by: Richard Levitte --- Summary of changes: CHANGES| 47 ++- NEWS | 11 ++- README | 2 +- crypto/asn1/tasn_dec.c | 7 +-- crypto/opensslv.h | 6 +++--- crypto/rsa/rsa_ameth.c | 2 +- openssl.spec | 2 +- test/Makefile | 7 --- 8 files changed, 67 insertions(+), 17 deletions(-) diff --git a/CHANGES b/CHANGES index 178d010..915b1f6 100644 --- a/CHANGES +++ b/CHANGES @@ -2,7 +2,38 @@ OpenSSL CHANGES ___ - Changes between 1.0.1p and 1.0.1q [xx XXX ] + Changes between 1.0.1q and 1.0.1r [xx XXX ] + + *) + + Changes between 1.0.1p and 1.0.1q [3 Dec 2015] + + *) Certificate verify crash with missing PSS parameter + + The signature verification routines will crash with a NULL pointer + dereference if presented with an ASN.1 signature using the RSA PSS + algorithm and absent mask generation function parameter. Since these + routines are used to verify certificate signature algorithms this can be + used to crash any certificate verification operation and exploited in a + DoS attack. Any application which performs certificate verification is + vulnerable including OpenSSL clients and servers which enable client + authentication. + + This issue was reported to OpenSSL by Loïc Jonas Etienne (Qnective AG). + (CVE-2015-3194) + [Stephen Henson] + + *) X509_ATTRIBUTE memory leak + + When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak + memory. This structure is used by the PKCS#7 and CMS routines so any + application which reads PKCS#7 or CMS data from untrusted sources is + affected. SSL/TLS is not affected. + + This issue was reported to OpenSSL by Adam Langley (Google/BoringSSL) using + libFuzzer. + (CVE-2015-3195) + [Stephen Henson] *) Rewrite EVP_DecodeUpdate (base64 decoding) to fix several bugs. This changes the decoding behaviour for some invalid messages, @@ -14,9 +45,6 @@ return an error [Rich Salz and Ismo Puustinen ] - *) Rewrite PSK to support ECDHE_PSK, DHE_PSK and RSA_PSK. Add ciphersuites - from RFC4279, RFC4785, RFC5487,
[openssl-commits] [openssl] OpenSSL_1_0_0t create
The annotated tag OpenSSL_1_0_0t has been created at 07ecb6190a68fa9aeefc64ec510b3244ac9f4e7a (tag) tagging ce052c8437fb97cbc57f034fa94b5bcd749dbf52 (commit) replaces OpenSSL_1_0_0s tagged by Matt Caswell on Thu Dec 3 14:56:22 2015 + - Log - OpenSSL 1.0.0t release tag Dirk Wetter (1): GH336: Return an exit code if report fails Dr. Stephen Henson (11): Don't output bogus errors in PKCS12_parse Fix PSK handling. document -2 return value Sort @sstacklst correctly. Use default field separator. Don't try and parse boolean type. Typo. Limit depth of ASN1 parse printing. Fix uninitialised p error. Fix leak with ASN.1 combine. Free up passed ASN.1 structure if reused. Ismo Puustinen (1): GH367: use random data if seed too short. Ivo Raisr (1): Make no-psk compile without warnings. Loganaden Velvindron (1): Clear BN-mont values when free'ing it. Martin Vejnar (1): RT3774: double-free in DSA Matt Caswell (5): Prepare for 1.0.0t-dev Fix building with OPENSSL_NO_TLSEXT. Make sure OPENSSL_cleanse checks for NULL Update CHANGES and NEWS Prepare for 1.0.0t release Rich Salz (5): Tweak README about rt and bug reporting. Move FAQ to the web. GH398: Add mingw cross-compile, etc. Remove stricts-warnings on 1.0.0 travis. Change --debug to -d for compat with old releases. Richard Levitte (10): Remove one extraneous parenthesis Make preprocessor error into real preprocessor error Stop using tardy Set numeric IDs for tar as well Remove extra '; \' in apps/Makefile Add emacs CC mode style for OpenSSL Add an example .dir-locals.el Remove auto-fill-mode Ignore .dir-locals.el _BSD_SOURCE is deprecated, use _DEFAULT_SOURCE instead --- _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [web] master update
The branch master has been updated via b954344e5f61310b12c50e5042bff7af512b4457 (commit) from fda590f8c6af8c40f522e3f62a67b6b5f39f5dde (commit) - Log - commit b954344e5f61310b12c50e5042bff7af512b4457 Author: Richard LevitteDate: Thu Dec 3 17:11:38 2015 +0100 Make sure to redirect the old release notes --- Summary of changes: news/.htaccess | 5 + 1 file changed, 5 insertions(+) diff --git a/news/.htaccess b/news/.htaccess index 6c8fb10..9ca8d84 100644 --- a/news/.htaccess +++ b/news/.htaccess @@ -1,3 +1,8 @@ +Redirect permanent /news/openssl-0.9.8-notes.html /news/cl098.txt +Redirect permanent /news/openssl-1.0.0-notes.html /news/cl100.txt +Redirect permanent /news/openssl-1.0.1-notes.html /news/cl101.txt +Redirect permanent /news/openssl-1.0.2-notes.html /news/cl102.txt + RewriteEngine on RewriteCond %{REQUEST_FILENAME} !-f RewriteRule secadv_(.*) /news/secadv/$1 [L,R=302,NC] _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [web] master update
The branch master has been updated via fda590f8c6af8c40f522e3f62a67b6b5f39f5dde (commit) from 76e25ea3709538ce2b534e6bde4f897942146e93 (commit) - Log - commit fda590f8c6af8c40f522e3f62a67b6b5f39f5dde Author: Matt Caswell <m...@openssl.org> Date: Thu Dec 3 15:29:34 2015 + Add release and vulnerabilities information to website for release --- Summary of changes: news/newsflash.txt | 5 ++ news/secadv/20151203.txt | 123 +++ news/vulnerabilities.xml | 214 ++- 3 files changed, 341 insertions(+), 1 deletion(-) create mode 100644 news/secadv/20151203.txt diff --git a/news/newsflash.txt b/news/newsflash.txt index 44b973c..cf51a94 100644 --- a/news/newsflash.txt +++ b/news/newsflash.txt @@ -4,6 +4,11 @@ # Format is two fields, colon-separated; the first line is the column # headings. URL paths must all be absolute. Date: Item +03-Dec-2015: Security Advisory: four security fixes +03-Dec-2015: OpenSSL 1.0.2e is now available, including bug and security fixes +03-Dec-2015: OpenSSL 1.0.1q is now available, including bug and security fixes +03-Dec-2015: OpenSSL 1.0.0t is now available, including bug and security fixes +03-Dec-2015: OpenSSL 0.9.8zh is now available, including bug and security fixes 09-Jul-2015: Security Advisory: one security fix 09-Jul-2015: OpenSSL 1.0.2d is now available, including bug and security fixes 09-Jul-2015: OpenSSL 1.0.1p is now available, including bug and security fixes diff --git a/news/secadv/20151203.txt b/news/secadv/20151203.txt new file mode 100644 index 000..44051a2 --- /dev/null +++ b/news/secadv/20151203.txt @@ -0,0 +1,123 @@ +OpenSSL Security Advisory [3 Dec 2015] +=== + +NOTE: WE ANTICIPATE THAT 1.0.0t AND 0.9.8zh WILL BE THE LAST RELEASES FOR THE +0.9.8 AND 1.0.0 VERSIONS AND THAT NO MORE SECURITY FIXES WILL BE PROVIDED (AS +PER PREVIOUS ANNOUNCEMENTS). USERS ARE ADVISED TO UPGRADE TO LATER VERSIONS. + +BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193) +== + +Severity: Moderate + +There is a carry propagating bug in the x86_64 Montgomery squaring procedure. No +EC algorithms are affected. Analysis suggests that attacks against RSA and DSA +as a result of this defect would be very difficult to perform and are not +believed likely. Attacks against DH are considered just feasible (although very +difficult) because most of the work necessary to deduce information +about a private key may be performed offline. The amount of resources +required for such an attack would be very significant and likely only +accessible to a limited number of attackers. An attacker would +additionally need online access to an unpatched system using the target +private key in a scenario with persistent DH parameters and a private +key that is shared between multiple clients. For example this can occur by +default in OpenSSL DHE based SSL/TLS ciphersuites. + +This issue affects OpenSSL version 1.0.2. + +OpenSSL 1.0.2 users should upgrade to 1.0.2e + +This issue was reported to OpenSSL on August 13 2015 by Hanno +Böck. The fix was developed by Andy Polyakov of the OpenSSL +development team. + +Certificate verify crash with missing PSS parameter (CVE-2015-3194) +=== + +Severity: Moderate + +The signature verification routines will crash with a NULL pointer dereference +if presented with an ASN.1 signature using the RSA PSS algorithm and absent +mask generation function parameter. Since these routines are used to verify +certificate signature algorithms this can be used to crash any certificate +verification operation and exploited in a DoS attack. Any application which +performs certificate verification is vulnerable including OpenSSL clients and +servers which enable client authentication. + +This issue affects OpenSSL versions 1.0.2 and 1.0.1. + +OpenSSL 1.0.2 users should upgrade to 1.0.2e +OpenSSL 1.0.1 users should upgrade to 1.0.1q + +This issue was reported to OpenSSL on August 27 2015 by Loïc Jonas Etienne +(Qnective AG). The fix was developed by Dr. Stephen Henson of the OpenSSL +development team. + +X509_ATTRIBUTE memory leak (CVE-2015-3195) +== + +Severity: Moderate + +When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak +memory. This structure is used by the PKCS#7 and CMS routines so any +application which reads PKCS#7 or CMS data from untrusted sources is affected. +SSL/TLS is not affected. + +This issue affects OpenSSL versions 1.0.2 and 1.0.1, 1.0.0 and 0.9.8. + +OpenSSL 1.0.2 users should upgrade to 1.0.2e +OpenSSL 1.0.1 users should upgrade to 1.0.1q +OpenSSL 1.0.0 users should upgrade to
[openssl-commits] [web] master update
The branch master has been updated via 8fa5106fbbdebe56eab4784a5c14bce8f8676d6d (commit) from eebadc3b6b3ac68cc9bbe03cdc814f2c9d02486a (commit) - Log - commit 8fa5106fbbdebe56eab4784a5c14bce8f8676d6d Author: Rich SalzDate: Thu Dec 3 14:19:50 2015 -0500 redirect /license to policies/cla --- Summary of changes: .htaccess | 2 ++ 1 file changed, 2 insertions(+) diff --git a/.htaccess b/.htaccess index 803ad34..74aa4f3 100644 --- a/.htaccess +++ b/.htaccess @@ -6,6 +6,8 @@ Redirect permanent /about/releasestrat.html /policies/releasestrat.html Redirect permanent /licenses/openssl_ccla.pdf /policies/openssl_ccla.pdf Redirect permanent /licenses/openssl_icla.pdf /policies/openssl_icla.pdf Redirect permanent /support/faq.html /docs/faq.html +Redirect permanent /licenses /policies/cla.html +Redirect permanent /licenses/ /policies/cla.html ForceType application/binary _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [web] master update
The branch master has been updated via 10ac045c44c14a807dc5c257417e3c4839c5961c (commit) from 8fa5106fbbdebe56eab4784a5c14bce8f8676d6d (commit) - Log - commit 10ac045c44c14a807dc5c257417e3c4839c5961c Author: Richard LevitteDate: Thu Dec 3 21:26:10 2015 +0100 Remove source/.htaccess from versioning since it's generated --- Summary of changes: source/.htaccess | 30 -- 1 file changed, 30 deletions(-) delete mode 100644 source/.htaccess diff --git a/source/.htaccess b/source/.htaccess deleted file mode 100644 index 6a2766d..000 --- a/source/.htaccess +++ /dev/null @@ -1,30 +0,0 @@ -RewriteEngine on -RewriteBase /source -# First, rewrite all the 'latest' URLs -RewriteRule ^latest.tar.gz$ openssl-1.0.2d.tar.gz [L,R=302,NC] -RewriteRule ^openssl-0.9.8-latest.tar.gz$ openssl-0.9.8zg.tar.gz [L,R=302,NC] -RewriteRule ^openssl-1.0.0-latest.tar.gz$ openssl-1.0.0s.tar.gz [L,R=302,NC] -RewriteRule ^openssl-1.0.1-latest.tar.gz$ openssl-1.0.1p.tar.gz [L,R=302,NC] -RewriteRule ^openssl-1.0.2-latest.tar.gz$ openssl-1.0.2d.tar.gz [L,R=302,NC] - -# Old distro's are in subdirs. -RewriteCond %{REQUEST_FILENAME} !-f -RewriteRule ^(openssl-0\.9\.8.*) old/0.9.x/$1 [L] -RewriteCond %{REQUEST_FILENAME} !-f -RewriteRule ^openssl-(1\.0\.0.*) old/1.0.0/openssl-$1 [L] -RewriteCond %{REQUEST_FILENAME} !-f -RewriteRule ^openssl-(1\.0\.1.*) old/1.0.1/openssl-$1 [L] -RewriteCond %{REQUEST_FILENAME} !-f -RewriteRule ^openssl-(1\.0\.2.*) old/1.0.1/openssl-$1 [L] -RewriteCond %{REQUEST_FILENAME} !-f -RewriteRule ^openssl-(fips.*) old/fips/openssl-$1 [L] - - -RemoveEncoding .gz - - -RemoveEncoding .gz - - -RemoveEncoding .gz - _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [web] master update
The branch master has been updated via 49266e288ce2698587c44205ac75b85f4d6da7cc (commit) via ac20fc67b72cf661dd2ae574b2e14d459c7a9f3f (commit) via 39a259dbd009b9167d8a1373c7df12e11e839cb7 (commit) from 10ac045c44c14a807dc5c257417e3c4839c5961c (commit) - Log - commit 49266e288ce2698587c44205ac75b85f4d6da7cc Author: Richard LevitteDate: Thu Dec 3 23:03:39 2015 +0100 Add release notes generator commit ac20fc67b72cf661dd2ae574b2e14d459c7a9f3f Author: Richard Levitte Date: Thu Dec 3 23:01:32 2015 +0100 Ignore source/.htacces since it's generated commit 39a259dbd009b9167d8a1373c7df12e11e839cb7 Author: Richard Levitte Date: Thu Dec 3 22:58:59 2015 +0100 Add dependencies, so make has a chance to determine if there's work to do --- Summary of changes: .gitignore| 3 ++ Makefile | 41 ++- bin/mk-notes | 39 + source/license.html => news/openssl-notes.html.in | 25 -- 4 files changed, 89 insertions(+), 19 deletions(-) create mode 100755 bin/mk-notes copy source/license.html => news/openssl-notes.html.in (52%) diff --git a/.gitignore b/.gitignore index f99f40b..e37e39d 100644 --- a/.gitignore +++ b/.gitignore @@ -15,9 +15,12 @@ news/changelog.txt news/newsflash.inc news/cl*.txt news/vulnerabilities.inc +news/openssl-*-notes.html +news/openssl-*-notes.inc newsflash.inc source/*.gz* source/*.patch +source/.htaccess source/index.inc source/license.txt source/old/*/*.patch diff --git a/Makefile b/Makefile index 6df8a09..3e10b5e 100644 --- a/Makefile +++ b/Makefile @@ -90,6 +90,31 @@ news/cl102.txt: $(CHECKOUTS)/openssl-1.0.2-stable/CHANGES @rm -f $@ cp $? $@ +news/openssl-0.9.8-notes.html: news/openssl-notes.html.in + @rm -f $@ + sed -e 's|@VERSION@|0.9.8|g' < $< > $@ +news/openssl-1.0.0-notes.html: news/openssl-notes.html.in + @rm -f $@ + sed -e 's|@VERSION@|1.0.0|g' < $< > $@ +news/openssl-1.0.1-notes.html: news/openssl-notes.html.in + @rm -f $@ + sed -e 's|@VERSION@|1.0.1|g' < $< > $@ +news/openssl-1.0.2-notes.html: news/openssl-notes.html.in + @rm -f $@ + sed -e 's|@VERSION@|1.0.2|g' < $< > $@ +news/openssl-0.9.8-notes.inc: $(CHECKOUTS)/openssl-0.9.8-stable/NEWS news/openssl-0.9.8-notes.html + @rm -f $@ + ./bin/mk-notes 0.9.8 < $(CHECKOUTS)/openssl-0.9.8-stable/NEWS > $@ +news/openssl-1.0.0-notes.inc: $(CHECKOUTS)/openssl-1.0.0-stable/NEWS news/openssl-1.0.0-notes.html + @rm -f $@ + ./bin/mk-notes 1.0.0 < $(CHECKOUTS)/openssl-1.0.0-stable/NEWS > $@ +news/openssl-1.0.1-notes.inc: $(CHECKOUTS)/openssl-1.0.1-stable/NEWS news/openssl-1.0.1-notes.html + @rm -f $@ + ./bin/mk-notes 1.0.1 < $(CHECKOUTS)/openssl-1.0.1-stable/NEWS > $@ +news/openssl-1.0.2-notes.inc: $(CHECKOUTS)/openssl-1.0.2-stable/NEWS news/openssl-1.0.2-notes.html + @rm -f $@ + ./bin/mk-notes 1.0.2 < $(CHECKOUTS)/openssl-1.0.2-stable/NEWS > $@ + news/newsflash.inc: news/newsflash.txt sed <$? >$@ \ -e '/^#/d' \ @@ -103,32 +128,32 @@ news/vulnerabilities.inc: bin/vulnerabilities.xsl news/vulnerabilities.xml docs/faq.inc: docs/faq.txt @rm -f $@ ./bin/mk-faq <$? >$@ -docs/fips.inc: +docs/fips.inc: $(wildcard docs/fips/*) @rm -f $@ ./bin/mk-filelist docs/fips fips/ '*' >$@ -source/.htaccess: +source/.htaccess: $(wildcard source/openssl-*.tar.gz) @rm -f @? ./bin/mk-latest source >$@ source/license.txt: $(SNAP)/LICENSE @rm -f $@ cp $? $@ -source/index.inc: +source/index.inc: $(wildcard $(RELEASEDIR)/openssl-*.tar.gz) @rm -f $@ ./bin/mk-filelist -a $(RELEASEDIR) '' 'openssl-*.tar.gz' >$@ -source/old/0.9.x/index.inc: +source/old/0.9.x/index.inc: $(wildcard source/old/0.9.x/*.gz) @rm -f $@ ./bin/mk-filelist source/old/0.9.x '' '*.gz' >$@ -source/old/1.0.0/index.inc: +source/old/1.0.0/index.inc: $(wildcard source/old/1.0.0/*.gz) @rm -f $@ ./bin/mk-filelist source/old/1.0.0 '' '*.gz' >$@ -source/old/1.0.1/index.inc: +source/old/1.0.1/index.inc: $(wildcard source/old/1.0.1/*.gz) @rm -f $@ ./bin/mk-filelist source/old/1.0.1 '' '*.gz' >$@ -source/old/1.0.2/index.inc: +source/old/1.0.2/index.inc: $(wildcard source/old/1.0.2/*.gz) @rm -f $@ ./bin/mk-filelist source/old/1.0.2 '' '*.gz' >$@ -source/old/fips/index.inc: +source/old/fips/index.inc: $(wildcard source/old/fips/*.gz) @rm -f $@ ./bin/mk-filelist source/old/fips '' '*.gz' >$@ diff --git a/bin/mk-notes b/bin/mk-notes new file mode 100755 index 000..7738c6b --- /dev/null +++
[openssl-commits] [web] master update
The branch master has been updated via eebadc3b6b3ac68cc9bbe03cdc814f2c9d02486a (commit) from b954344e5f61310b12c50e5042bff7af512b4457 (commit) - Log - commit eebadc3b6b3ac68cc9bbe03cdc814f2c9d02486a Author: Richard LevitteDate: Thu Dec 3 19:04:36 2015 +0100 Fixup mk-latest --- Summary of changes: bin/mk-latest | 10 +- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/bin/mk-latest b/bin/mk-latest index 14f586f..2759297 100755 --- a/bin/mk-latest +++ b/bin/mk-latest @@ -34,15 +34,15 @@ print <<\EOF # Old distro's are in subdirs. RewriteCond %{REQUEST_FILENAME} !-f -RewriteRule (openssl-0\.9\.8.*) old/0.9.x/$1 [L] +RewriteRule ^(openssl-0\.9\.8.*) old/0.9.x/$1 [L] RewriteCond %{REQUEST_FILENAME} !-f -RewriteRule openssl-(1\.0\.0.*) old/1.0.0/openssl-$1 [L] +RewriteRule ^openssl-(1\.0\.0.*) old/1.0.0/openssl-$1 [L] RewriteCond %{REQUEST_FILENAME} !-f -RewriteRule openssl-(1\.0\.1.*) old/1.0.1/openssl-$1 [L] +RewriteRule ^openssl-(1\.0\.1.*) old/1.0.1/openssl-$1 [L] RewriteCond %{REQUEST_FILENAME} !-f -RewriteRule openssl-(1\.0\.2.*) old/1.0.1/openssl-$1 [L] +RewriteRule ^openssl-(1\.0\.2.*) old/1.0.1/openssl-$1 [L] RewriteCond %{REQUEST_FILENAME} !-f -RewriteRule openssl-(fips.*) old/fips/openssl-$1 [L] +RewriteRule ^openssl-(fips.*) old/fips/openssl-$1 [L] RemoveEncoding .gz _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build failed: openssl OpenSSL_1_0_1-stable.77
Build openssl OpenSSL_1_0_1-stable.77 failed Commit d585cc32a5 by Dr. Stephen Henson on 12/2/2015 9:49 PM: typo Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits