pkgsrc-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/security/openssl openssl: Update to 1.1.1k.
details: https://anonhg.NetBSD.org/pkgsrc/rev/0adec165e6a9
branches: trunk
changeset: 449297:0adec165e6a9
user: jperkin <jperkin%pkgsrc.org@localhost>
date: Thu Mar 25 16:36:19 2021 +0000
description:
openssl: Update to 1.1.1k.
Approved by @wiz during freeze.
Changes between 1.1.1j and 1.1.1k [25 Mar 2021]
*) Fixed a problem with verifying a certificate chain when using the
X509_V_FLAG_X509_STRICT flag. This flag enables additional security checks
of the certificates present in a certificate chain. It is not set by
default.
Starting from OpenSSL version 1.1.1h a check to disallow certificates in
the chain that have explicitly encoded elliptic curve parameters was added
as an additional strict check.
An error in the implementation of this check meant that the result of a
previous check to confirm that certificates in the chain are valid CA
certificates was overwritten. This effectively bypasses the check
that non-CA certificates must not be able to issue other certificates.
If a "purpose" has been configured then there is a subsequent opportunity
for checks that the certificate is a valid CA. All of the named "purpose"
values implemented in libcrypto perform this check. Therefore, where
a purpose is set the certificate chain will still be rejected even when the
strict flag has been used. A purpose is set by default in libssl client and
server certificate verification routines, but it can be overridden or
removed by an application.
In order to be affected, an application must explicitly set the
X509_V_FLAG_X509_STRICT verification flag and either not set a purpose
for the certificate verification or, in the case of TLS client or server
applications, override the default purpose.
(CVE-2021-3450)
[Tomáš Mráz]
*) Fixed an issue where an OpenSSL TLS server may crash if sent a maliciously
crafted renegotiation ClientHello message from a client. If a TLSv1.2
renegotiation ClientHello omits the signature_algorithms extension (where
it was present in the initial ClientHello), but includes a
signature_algorithms_cert extension then a NULL pointer dereference will
result, leading to a crash and a denial of service attack.
A server is only vulnerable if it has TLSv1.2 and renegotiation enabled
(which is the default configuration). OpenSSL TLS clients are not impacted
by this issue.
(CVE-2021-3449)
[Peter Kästle and Samuel Sapalski]
diffstat:
security/openssl/Makefile | 4 ++--
security/openssl/distinfo | 10 +++++-----
2 files changed, 7 insertions(+), 7 deletions(-)
diffs (30 lines):
diff -r 7d5f99f3e751 -r 0adec165e6a9 security/openssl/Makefile
--- a/security/openssl/Makefile Thu Mar 25 15:48:03 2021 +0000
+++ b/security/openssl/Makefile Thu Mar 25 16:36:19 2021 +0000
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.268 2021/02/20 08:53:23 wiz Exp $
+# $NetBSD: Makefile,v 1.269 2021/03/25 16:36:19 jperkin Exp $
-DISTNAME= openssl-1.1.1j
+DISTNAME= openssl-1.1.1k
CATEGORIES= security
MASTER_SITES= https://www.openssl.org/source/
diff -r 7d5f99f3e751 -r 0adec165e6a9 security/openssl/distinfo
--- a/security/openssl/distinfo Thu Mar 25 15:48:03 2021 +0000
+++ b/security/openssl/distinfo Thu Mar 25 16:36:19 2021 +0000
@@ -1,9 +1,9 @@
-$NetBSD: distinfo,v 1.148 2021/02/20 08:53:23 wiz Exp $
+$NetBSD: distinfo,v 1.149 2021/03/25 16:36:19 jperkin Exp $
-SHA1 (openssl-1.1.1j.tar.gz) = 04c340b086828eecff9df06dceff196790bb9268
-RMD160 (openssl-1.1.1j.tar.gz) = b88dd6c2f1587a2cf9e5670f697343808dc80ea6
-SHA512 (openssl-1.1.1j.tar.gz) = 51e44995663b5258b0018bdc1e2b0e7e8e0cce111138ca1f80514456af920fce4e409a411ce117c0f3eb9190ac3e47c53a43f39b06acd35b7494e2bec4a607d5
-Size (openssl-1.1.1j.tar.gz) = 9823161 bytes
+SHA1 (openssl-1.1.1k.tar.gz) = bad9dc4ae6dcc1855085463099b5dacb0ec6130b
+RMD160 (openssl-1.1.1k.tar.gz) = 5c9fbbeae7d115e59be705162e58195517a37cae
+SHA512 (openssl-1.1.1k.tar.gz) = 73cd042d4056585e5a9dd7ab68e7c7310a3a4c783eafa07ab0b560e7462b924e4376436a6d38a155c687f6942a881cfc0c1b9394afcde1d8c46bf396e7d51121
+Size (openssl-1.1.1k.tar.gz) = 9823400 bytes
SHA1 (patch-Configurations_shared-info.pl) = 0e835f6e343b5d05ef9a0e6ef2a195201262d15c
SHA1 (patch-Configurations_unix-Makefile.tmpl) = cf6b46c6e10e84100beb468bbe6f85c5e62cbe7a
SHA1 (patch-Configure) = 479f1bc826f7721f6b44d6b5a6cf460432924bf2
Home |
Main Index |
Thread Index |
Old Index