Skip to content

Commit 6098012

Browse files
danbevBethGriggs
authored andcommittedFeb 22, 2021
deps: upgrade openssl sources to 1.1.1j
This updates all sources in deps/openssl/openssl by: $ cd deps/openssl/ $ rm -rf openssl $ tar zxf ~/tmp/openssl-1.1.1j.tar.gz $ mv openssl-1.1.1j openssl $ git add --all openssl $ git commit openssl PR-URL: #37412 Backport-PR-URL: #37413 Reviewed-By: Rich Trott <rtrott@gmail.com> Reviewed-By: Colin Ihrig <cjihrig@gmail.com> Reviewed-By: Richard Lau <rlau@redhat.com> Reviewed-By: Beth Griggs <bgriggs@redhat.com>
1 parent afea10b commit 6098012

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

102 files changed

+849
-343
lines changed
 

‎deps/openssl/openssl/AUTHORS

+7
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ Ben Kaduk
1313
Bernd Edlinger
1414
Bodo Möller
1515
David Benjamin
16+
David von Oheimb
17+
Dmitry Belyavskiy (Дмитрий Белявский)
1618
Emilia Käsper
1719
Eric Young
1820
Geoff Thorpe
@@ -22,14 +24,19 @@ Lutz Jänicke
2224
Mark J. Cox
2325
Matt Caswell
2426
Matthias St. Pierre
27+
Nicola Tuveri
2528
Nils Larsch
29+
Patrick Steuer
2630
Paul Dale
2731
Paul C. Sutton
32+
Paul Yang
2833
Ralf S. Engelschall
2934
Rich Salz
3035
Richard Levitte
36+
Shane Lontis
3137
Stephen Henson
3238
Steve Marquess
3339
Tim Hudson
40+
Tomáš Mráz
3441
Ulf Möller
3542
Viktor Dukhovni

‎deps/openssl/openssl/CHANGES

+38-1
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,43 @@
77
https://github.com/openssl/openssl/commits/ and pick the appropriate
88
release branch.
99

10+
Changes between 1.1.1i and 1.1.1j [16 Feb 2021]
11+
12+
*) Fixed the X509_issuer_and_serial_hash() function. It attempts to
13+
create a unique hash value based on the issuer and serial number data
14+
contained within an X509 certificate. However it was failing to correctly
15+
handle any errors that may occur while parsing the issuer field (which might
16+
occur if the issuer field is maliciously constructed). This may subsequently
17+
result in a NULL pointer deref and a crash leading to a potential denial of
18+
service attack.
19+
(CVE-2021-23841)
20+
[Matt Caswell]
21+
22+
*) Fixed the RSA_padding_check_SSLv23() function and the RSA_SSLV23_PADDING
23+
padding mode to correctly check for rollback attacks. This is considered a
24+
bug in OpenSSL 1.1.1 because it does not support SSLv2. In 1.0.2 this is
25+
CVE-2021-23839.
26+
[Matt Caswell]
27+
28+
*) Fixed the EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate
29+
functions. Previously they could overflow the output length argument in some
30+
cases where the input length is close to the maximum permissable length for
31+
an integer on the platform. In such cases the return value from the function
32+
call would be 1 (indicating success), but the output length value would be
33+
negative. This could cause applications to behave incorrectly or crash.
34+
(CVE-2021-23840)
35+
[Matt Caswell]
36+
37+
*) Fixed SRP_Calc_client_key so that it runs in constant time. The previous
38+
implementation called BN_mod_exp without setting BN_FLG_CONSTTIME. This
39+
could be exploited in a side channel attack to recover the password. Since
40+
the attack is local host only this is outside of the current OpenSSL
41+
threat model and therefore no CVE is assigned.
42+
43+
Thanks to Mohammed Sabt and Daniel De Almeida Braga for reporting this
44+
issue.
45+
[Matt Caswell]
46+
1047
Changes between 1.1.1h and 1.1.1i [8 Dec 2020]
1148

1249
*) Fixed NULL pointer deref in the GENERAL_NAME_cmp function
@@ -52,7 +89,7 @@
5289
types. The same applies with the corresponding "min_protocol" and
5390
"max_protocol" command-line switches, in case some application uses both TLS
5491
and DTLS.
55-
92+
5693
SSL_CTX instances that are created for a fixed protocol version (e.g.
5794
TLSv1_server_method()) also silently ignore version bounds. Previously
5895
attempts to apply bounds to these protocol versions would result in an

0 commit comments

Comments
 (0)
Please sign in to comment.