Skip to content

Commit 0633ae7

Browse files
danbevrichardlau
authored andcommittedFeb 21, 2021
deps: upgrade openssl sources to 1.1.1j
This updates all sources in deps/openssl/openssl by: $ cd deps/openssl/ $ rm -rf openssl $ tar zxf ~/tmp/openssl-1.1.1j.tar.gz $ mv openssl-1.1.1j openssl $ git add --all openssl $ git commit openssl PR-URL: #37413 Reviewed-By: Richard Lau <rlau@redhat.com> Reviewed-By: Beth Griggs <bgriggs@redhat.com>
1 parent 75fd447 commit 0633ae7

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

90 files changed

+824
-322
lines changed
 

Diff for: ‎deps/openssl/openssl/AUTHORS

+7
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ Ben Kaduk
1313
Bernd Edlinger
1414
Bodo Möller
1515
David Benjamin
16+
David von Oheimb
17+
Dmitry Belyavskiy (Дмитрий Белявский)
1618
Emilia Käsper
1719
Eric Young
1820
Geoff Thorpe
@@ -22,14 +24,19 @@ Lutz Jänicke
2224
Mark J. Cox
2325
Matt Caswell
2426
Matthias St. Pierre
27+
Nicola Tuveri
2528
Nils Larsch
29+
Patrick Steuer
2630
Paul Dale
2731
Paul C. Sutton
32+
Paul Yang
2833
Ralf S. Engelschall
2934
Rich Salz
3035
Richard Levitte
36+
Shane Lontis
3137
Stephen Henson
3238
Steve Marquess
3339
Tim Hudson
40+
Tomáš Mráz
3441
Ulf Möller
3542
Viktor Dukhovni

Diff for: ‎deps/openssl/openssl/CHANGES

+37
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,43 @@
77
https://github.com/openssl/openssl/commits/ and pick the appropriate
88
release branch.
99

10+
Changes between 1.1.1i and 1.1.1j [16 Feb 2021]
11+
12+
*) Fixed the X509_issuer_and_serial_hash() function. It attempts to
13+
create a unique hash value based on the issuer and serial number data
14+
contained within an X509 certificate. However it was failing to correctly
15+
handle any errors that may occur while parsing the issuer field (which might
16+
occur if the issuer field is maliciously constructed). This may subsequently
17+
result in a NULL pointer deref and a crash leading to a potential denial of
18+
service attack.
19+
(CVE-2021-23841)
20+
[Matt Caswell]
21+
22+
*) Fixed the RSA_padding_check_SSLv23() function and the RSA_SSLV23_PADDING
23+
padding mode to correctly check for rollback attacks. This is considered a
24+
bug in OpenSSL 1.1.1 because it does not support SSLv2. In 1.0.2 this is
25+
CVE-2021-23839.
26+
[Matt Caswell]
27+
28+
*) Fixed the EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate
29+
functions. Previously they could overflow the output length argument in some
30+
cases where the input length is close to the maximum permissable length for
31+
an integer on the platform. In such cases the return value from the function
32+
call would be 1 (indicating success), but the output length value would be
33+
negative. This could cause applications to behave incorrectly or crash.
34+
(CVE-2021-23840)
35+
[Matt Caswell]
36+
37+
*) Fixed SRP_Calc_client_key so that it runs in constant time. The previous
38+
implementation called BN_mod_exp without setting BN_FLG_CONSTTIME. This
39+
could be exploited in a side channel attack to recover the password. Since
40+
the attack is local host only this is outside of the current OpenSSL
41+
threat model and therefore no CVE is assigned.
42+
43+
Thanks to Mohammed Sabt and Daniel De Almeida Braga for reporting this
44+
issue.
45+
[Matt Caswell]
46+
1047
Changes between 1.1.1h and 1.1.1i [8 Dec 2020]
1148

1249
*) Fixed NULL pointer deref in the GENERAL_NAME_cmp function

0 commit comments

Comments
 (0)
Please sign in to comment.