Skip to content

Commit f5b3433

Browse files
sam-githubrvagg
authored andcommittedNov 24, 2018
deps: upgrade openssl sources to 1.0.2q
This updates all sources in deps/openssl/openssl with openssl-1.0.2q. PR-URL: #24530 Reviewed-By: Shigeki Ohtsu <ohtsu@ohtsu.org> Reviewed-By: Daniel Bevenius <daniel.bevenius@gmail.com> Reviewed-By: Rod Vagg <rod@vagg.org>
1 parent ebe617e commit f5b3433

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

143 files changed

+1893
-38856
lines changed
 

‎deps/openssl/openssl.gypi

+1
Original file line numberDiff line numberDiff line change
@@ -407,6 +407,7 @@
407407
'openssl/crypto/evp/pmeth_lib.c',
408408
'openssl/crypto/ex_data.c',
409409
'openssl/crypto/fips_ers.c',
410+
'openssl/crypto/getenv.c',
410411
'openssl/crypto/hmac/hm_ameth.c',
411412
'openssl/crypto/hmac/hm_pmeth.c',
412413
'openssl/crypto/hmac/hmac.c',

‎deps/openssl/openssl/CHANGES

+30
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,36 @@
77
https://github.com/openssl/openssl/commits/ and pick the appropriate
88
release branch.
99

10+
Changes between 1.0.2p and 1.0.2q [20 Nov 2018]
11+
12+
*) Microarchitecture timing vulnerability in ECC scalar multiplication
13+
14+
OpenSSL ECC scalar multiplication, used in e.g. ECDSA and ECDH, has been
15+
shown to be vulnerable to a microarchitecture timing side channel attack.
16+
An attacker with sufficient access to mount local timing attacks during
17+
ECDSA signature generation could recover the private key.
18+
19+
This issue was reported to OpenSSL on 26th October 2018 by Alejandro
20+
Cabrera Aldaya, Billy Brumley, Sohaib ul Hassan, Cesar Pereida Garcia and
21+
Nicola Tuveri.
22+
(CVE-2018-5407)
23+
[Billy Brumley]
24+
25+
*) Timing vulnerability in DSA signature generation
26+
27+
The OpenSSL DSA signature algorithm has been shown to be vulnerable to a
28+
timing side channel attack. An attacker could use variations in the signing
29+
algorithm to recover the private key.
30+
31+
This issue was reported to OpenSSL on 16th October 2018 by Samuel Weiser.
32+
(CVE-2018-0734)
33+
[Paul Dale]
34+
35+
*) Resolve a compatibility issue in EC_GROUP handling with the FIPS Object
36+
Module, accidentally introduced while backporting security fixes from the
37+
development branch and hindering the use of ECC in FIPS mode.
38+
[Nicola Tuveri]
39+
1040
Changes between 1.0.2o and 1.0.2p [14 Aug 2018]
1141

1242
*) Client DoS due to large DH parameter

0 commit comments

Comments
 (0)
Please sign in to comment.