OpenSSL version 1.1.1d published
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 OpenSSL version 1.1.1d released === OpenSSL - The Open Source toolkit for SSL/TLS https://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 1.1.1d of our open source toolkit for SSL/TLS. For details of changes and known issues see the release notes at: https://www.openssl.org/news/openssl-1.1.1-notes.html OpenSSL 1.1.1d is available for download via HTTP and FTP from the following master locations (you can find the various FTP mirrors under https://www.openssl.org/source/mirror.html): * https://www.openssl.org/source/ * ftp://ftp.openssl.org/source/ The distribution file name is: o openssl-1.1.1d.tar.gz Size: 8845861 SHA1 checksum: 056057782325134b76d1931c48f2c7e6595d7ef4 SHA256 checksum: 1e3a91bc1f9dfce01af26026f856e064eab4c8ee0a8f457b5ae30b40b8b711f2 The checksums were calculated using the following commands: openssl sha1 openssl-1.1.1d.tar.gz openssl sha256 openssl-1.1.1d.tar.gz Yours, The OpenSSL Project Team. -BEGIN PGP SIGNATURE- iQEzBAEBCgAdFiEEhlersmDwVrHlGQg52cTSbQ5gRJEFAl13oWoACgkQ2cTSbQ5g RJFGjwf+IA34TBZZt/lwjtsALggJuoRrYyCBCDbdwJA+rBO2uQV2h+f7Tj5FBcuI ARRhbUJqCDq7MFl1+6O5jPhTxZK0P1z242rOTvW50w4MFy+FZCwZjloxRBtgOlTy y4t7yzuvCU1RidKiK9B42a6KypgQFEEHSlCkepNAjX94OLQhB+iF20vJ86gSFzrv keJTUDXEbAa7I9MyK9p7SQbqHgFbTt0QAIYj/afNGOGv6ZyjiVrbp+4I29I0IG98 Dn4+4dp0xaY+oC1FTyO+lqfTLXuSnVR8TGDACHFyeQHCjf6wfSbFlxfH40CfeQzv 8vakK0+YhIAij7Pcm4te9ffUaSeNHg== =jsdh -END PGP SIGNATURE-
OpenSSL version 1.1.0l published
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 OpenSSL version 1.1.0l released === OpenSSL - The Open Source toolkit for SSL/TLS https://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 1.1.0l of our open source toolkit for SSL/TLS. For details of changes and known issues see the release notes at: https://www.openssl.org/news/openssl-1.1.0-notes.html OpenSSL 1.1.0l is available for download via HTTP and FTP from the following master locations (you can find the various FTP mirrors under https://www.openssl.org/source/mirror.html): * https://www.openssl.org/source/ * ftp://ftp.openssl.org/source/ The distribution file name is: o openssl-1.1.0l.tar.gz Size: 5294857 SHA1 checksum: 6e3507b29e2630f56023887d1f7d7ba1f584819b SHA256 checksum: 74a2f756c64fd7386a29184dc0344f4831192d61dc2481a93a4c5dd727f41148 The checksums were calculated using the following commands: openssl sha1 openssl-1.1.0l.tar.gz openssl sha256 openssl-1.1.0l.tar.gz Yours, The OpenSSL Project Team. -BEGIN PGP SIGNATURE- iQEzBAEBCgAdFiEEhlersmDwVrHlGQg52cTSbQ5gRJEFAl13okkACgkQ2cTSbQ5g RJFu5wf9HCvluEc1W1UwNqaw48n3g1ZclRdexYFO12HtUTTtriUwu0BPorvzHVmo x4I0JzUxLeRXyS2kdBBPJC0OlPlrZMkWfwNy9IF2BRFGcMuGhjIOu60FfRNkGOM8 63RdIuSy1oPnwL4kUOdQi4pru1UcQVx25l4tpB6pLMKKgioGc1x75mP+C/lxhM16 PvPSo8pETU60V2QFaxzbfOqbS8LJhbO2m+dYCzgGy6Rjrd2CyzyZbtKC/bWoyMhW s3jQ4oBjGh28y/mrzLup9oXP4f4/GlWajxd+pFXsj8xRfwEN7Zwg7eLlg6uZh6Cq 4KhsFKHIKgvba/lekhASdh71BdVVSA== =na1Q -END PGP SIGNATURE-
OpenSSL version 1.0.2t published
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 OpenSSL version 1.0.2t released === OpenSSL - The Open Source toolkit for SSL/TLS https://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 1.0.2t of our open source toolkit for SSL/TLS. For details of changes and known issues see the release notes at: https://www.openssl.org/news/openssl-1.0.2-notes.html OpenSSL 1.0.2t is available for download via HTTP and FTP from the following master locations (you can find the various FTP mirrors under https://www.openssl.org/source/mirror.html): * https://www.openssl.org/source/ * ftp://ftp.openssl.org/source/ The distribution file name is: o openssl-1.0.2t.tar.gz Size: 5355422 SHA1 checksum: 8ac3fd379cf8c8ef570abb51ec52a88fd526f88a SHA256 checksum: 14cb464efe7ac6b54799b34456bd69558a749a4931ecfd9cf9f71d7881cac7bc The checksums were calculated using the following commands: openssl sha1 openssl-1.0.2t.tar.gz openssl sha256 openssl-1.0.2t.tar.gz Yours, The OpenSSL Project Team. -BEGIN PGP SIGNATURE- iQEzBAEBCgAdFiEEhlersmDwVrHlGQg52cTSbQ5gRJEFAl13pssACgkQ2cTSbQ5g RJFr9wf/X0fke/exS13hQb4h9RqE9fYouVbSNKTKhLp9X8BtYUOtUTjO5ispKt+1 BGWBotApoXBTopOsdJVXhzLtYst2YdKEtvyJAEFyxfpJa2PL4jmo5zxk93qWjDjA u0HXR1Tu4XTLlE3EfqbfV/8bVO4kntTCk/xvg0gql1LUCVIRtjmqmsKOe7MJAHkH 94yb3kRFMpXb2YB6/zrK+ZuruL5ejTZCcXG7Dx9+LH5X7E/8KFDknk0Zo6w6970I LbrXjtAOfHtVEK5XAFESCkMkjNqahopOs90AtemiOt1oOsNztjr7bVFHqJ3/oBMf OYamiO1W2IhyxnPbet6zUDYG0FtYpw== =sBvh -END PGP SIGNATURE-
Re: Repo Frozen
will we release today? On 9/9/19 5:31 PM, Matt Caswell wrote: > Richard has just frozen the repo in advance of the releases tomorrow. > > There are still some PRs outstanding that we are expecting to be included and > I > will push as they become available: > > > https://github.com/openssl/openssl/pull/9777 > Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey > > Awaiting an update from Bernd > > > https://github.com/openssl/openssl/pull/9802 > drbg: ensure fork-safety [1.1.1] > > Approved, but awaiting input from Kurt > > > https://github.com/openssl/openssl/pull/9811 > [1.0.2-bp][ec] match built-in curves on EC_GROUP_new_from_ecparameters > > Not sure if Nicola wanted to do a final update, but otherwise its approved and > ready to go. > > > There will also be some CHANGES/NEWS type updates required > > > Matt > >
Re: Repo Frozen
Release is semi complete and repo is unfrozen. Matt On 09/09/2019 16:31, Matt Caswell wrote: > Richard has just frozen the repo in advance of the releases tomorrow. > > There are still some PRs outstanding that we are expecting to be included and > I > will push as they become available: > > > https://github.com/openssl/openssl/pull/9777 > Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey > > Awaiting an update from Bernd > > > https://github.com/openssl/openssl/pull/9802 > drbg: ensure fork-safety [1.1.1] > > Approved, but awaiting input from Kurt > > > https://github.com/openssl/openssl/pull/9811 > [1.0.2-bp][ec] match built-in curves on EC_GROUP_new_from_ecparameters > > Not sure if Nicola wanted to do a final update, but otherwise its approved and > ready to go. > > > There will also be some CHANGES/NEWS type updates required > > > Matt > >
Re: Repo Frozen
As per my earlier email - the release is done and the repo is unfrozen. We are unable to update the website at the moment due to a technical problem. But I have sent a link out to openssl-project/users/announce where you can temporarily download the tarballs from until we fix the issue. Matt On 10/09/2019 17:54, Bernd Edlinger wrote: > will we release today? > > On 9/9/19 5:31 PM, Matt Caswell wrote: >> Richard has just frozen the repo in advance of the releases tomorrow. >> >> There are still some PRs outstanding that we are expecting to be included >> and I >> will push as they become available: >> >> >> https://github.com/openssl/openssl/pull/9777 >> Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey >> >> Awaiting an update from Bernd >> >> >> https://github.com/openssl/openssl/pull/9802 >> drbg: ensure fork-safety [1.1.1] >> >> Approved, but awaiting input from Kurt >> >> >> https://github.com/openssl/openssl/pull/9811 >> [1.0.2-bp][ec] match built-in curves on EC_GROUP_new_from_ecparameters >> >> Not sure if Nicola wanted to do a final update, but otherwise its approved >> and >> ready to go. >> >> >> There will also be some CHANGES/NEWS type updates required >> >> >> Matt >> >>
OpenSSL Security Advisory
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 OpenSSL Security Advisory [10 September 2019] = ECDSA remote timing attack (CVE-2019-1547) == Severity: Low Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. OpenSSL versions 1.1.1, 1.1.0 and 1.0.2 are affected by this issue. OpenSSL 1.1.1 users should upgrade to 1.1.1d OpenSSL 1.1.0 users should upgrade to 1.1.0l OpenSSL 1.0.2 users should upgrade to 1.0.2t This issue was reported by Cesar Pereida GarcĂa, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, and Billy Brumley. The fix was developed by Billy Brumley. It was reported to OpenSSL on 5th August 2019. Fork Protection (CVE-2019-1549) === Severity: Low OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this protection was not being used in the default case. A partial mitigation for this issue is that the output from a high precision timer is mixed into the RNG state so the likelihood of a parent and child process sharing state is significantly reduced. If an application already calls OPENSSL_init_crypto() explicitly using OPENSSL_INIT_ATFORK then this problem does not occur at all. OpenSSL version 1.1.1 is affected by this issue. OpenSSL 1.1.1 users should upgrade to 1.1.1d This issue was reported by Matt Caswell. The fix was developed by Matthias St. Pierre. It was reported to OpenSSL on 27th May 2019. Padding Oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey (CVE-2019-1563) Severity: Low In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. OpenSSL 1.1.1 users should upgrade to 1.1.1d OpenSSL 1.1.0 users should upgrade to 1.1.0l OpenSSL 1.0.2 users should upgrade to 1.0.2t This issue was reported by and the fix developed by Bernd Edlinger. It was reported to OpenSSL on 21st August 2019. Note = OpenSSL 1.0.2 is currently only receiving security updates. Support for 1.0.2 will end on 31st December 2019. Support for 1.1.0 ends on 11th September 2019 so 1.1.0l is expected to be the last 1.1.0 release. Users of these versions should upgrade to OpenSSL 1.1.1. References == URL for this Security Advisory: https://www.openssl.org/news/secadv/20190910.txt Note: the online version of the advisory may be updated with additional details over time. For details of OpenSSL severity classifications please see: https://www.openssl.org/policies/secpolicy.html -BEGIN PGP SIGNATURE- iQEzBAEBCgAdFiEEhlersmDwVrHlGQg52cTSbQ5gRJEFAl13vK0ACgkQ2cTSbQ5g RJGJIgf+Me900bLV9TrVDWvNRQbuRe0tOPPhP59J4tJAJiRZ1GG0JV2YITQynjTP hrz9mvajgWbkGYlTZmPVFOdJr7LKbrUrxk7shEfXqmiiCLG8tHYiCe3PF+/Cy7gA X1vY9CDfv//3VSqOLM9RM3CCcWAAv3KeP851X0PgCiMVvGAJbYOu3bmB+KsEKFzm fWRDabUMbl1KCSgCIvvlNv0bKR/GfpW3cWruUvG0sfjyPWwS+yn8z0T3/ibFJqkb Cmuqa3/kC9uZg8AhiODR+nz6D1mC2UiNZ2Wa/XO6O68rO/y3ZKbaiMGLze1qJep5 3PnybOw8b3JvpVRFYw09YwgLObBX8w== =8bP1 -END PGP SIGNATURE-
Re: Forthcoming OpenSSL Releases
On 03/09/2019 17:19, Matt Caswell wrote: > The OpenSSL project team would like to announce the forthcoming release > of OpenSSL versions 1.1.1d, 1.1.0l and 1.0.2t. > > These releases will be made available on 10th September 2019 between > approximately 1200-1600 UTC. > > These are security fix releases. The highest severity security issue fixed by > these releases is rated as LOW. > > Please note that this is expected to be the last release of 1.1.0 before it > goes > out of support on 11th September 2019. We have encountered some technical problems pushing these releases onto the website today. Until those are resolved the release tarballs are not visible via the standard links. The releases are temporarily available at this non-standard location: https://www.openssl.org/source/? You can download them directly from there until such time as we fix the website. We will send out the normal release announcements as soon as everything is working normally again. Regards Matt signature.asc Description: OpenPGP digital signature