Skip to content

Commit 1d9579d

Browse files
committed
NetBSD src for "user", checkout.sh rev 2a4477982976c8f012be2b2537567a8afe7c66d9
1 parent 17ff217 commit 1d9579d

File tree

1,457 files changed

+287245
-283579
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,457 files changed

+287245
-283579
lines changed

crypto/external/bsd/openssl/dist/CHANGES

Lines changed: 82 additions & 279 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,88 @@
22
OpenSSL CHANGES
33
_______________
44

5+
Changes between 1.0.1l and 1.0.1m [19 Mar 2015]
6+
7+
*) Segmentation fault in ASN1_TYPE_cmp fix
8+
9+
The function ASN1_TYPE_cmp will crash with an invalid read if an attempt is
10+
made to compare ASN.1 boolean types. Since ASN1_TYPE_cmp is used to check
11+
certificate signature algorithm consistency this can be used to crash any
12+
certificate verification operation and exploited in a DoS attack. Any
13+
application which performs certificate verification is vulnerable including
14+
OpenSSL clients and servers which enable client authentication.
15+
(CVE-2015-0286)
16+
[Stephen Henson]
17+
18+
*) ASN.1 structure reuse memory corruption fix
19+
20+
Reusing a structure in ASN.1 parsing may allow an attacker to cause
21+
memory corruption via an invalid write. Such reuse is and has been
22+
strongly discouraged and is believed to be rare.
23+
24+
Applications that parse structures containing CHOICE or ANY DEFINED BY
25+
components may be affected. Certificate parsing (d2i_X509 and related
26+
functions) are however not affected. OpenSSL clients and servers are
27+
not affected.
28+
(CVE-2015-0287)
29+
[Stephen Henson]
30+
31+
*) PKCS7 NULL pointer dereferences fix
32+
33+
The PKCS#7 parsing code does not handle missing outer ContentInfo
34+
correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with
35+
missing content and trigger a NULL pointer dereference on parsing.
36+
37+
Applications that verify PKCS#7 signatures, decrypt PKCS#7 data or
38+
otherwise parse PKCS#7 structures from untrusted sources are
39+
affected. OpenSSL clients and servers are not affected.
40+
41+
This issue was reported to OpenSSL by Michal Zalewski (Google).
42+
(CVE-2015-0289)
43+
[Emilia K�sper]
44+
45+
*) DoS via reachable assert in SSLv2 servers fix
46+
47+
A malicious client can trigger an OPENSSL_assert (i.e., an abort) in
48+
servers that both support SSLv2 and enable export cipher suites by sending
49+
a specially crafted SSLv2 CLIENT-MASTER-KEY message.
50+
51+
This issue was discovered by Sean Burford (Google) and Emilia K�sper
52+
(OpenSSL development team).
53+
(CVE-2015-0293)
54+
[Emilia K�sper]
55+
56+
*) Use After Free following d2i_ECPrivatekey error fix
57+
58+
A malformed EC private key file consumed via the d2i_ECPrivateKey function
59+
could cause a use after free condition. This, in turn, could cause a double
60+
free in several private key parsing functions (such as d2i_PrivateKey
61+
or EVP_PKCS82PKEY) and could lead to a DoS attack or memory corruption
62+
for applications that receive EC private keys from untrusted
63+
sources. This scenario is considered rare.
64+
65+
This issue was discovered by the BoringSSL project and fixed in their
66+
commit 517073cd4b.
67+
(CVE-2015-0209)
68+
[Matt Caswell]
69+
70+
*) X509_to_X509_REQ NULL pointer deref fix
71+
72+
The function X509_to_X509_REQ will crash with a NULL pointer dereference if
73+
the certificate key is invalid. This function is rarely used in practice.
74+
75+
This issue was discovered by Brian Carpenter.
76+
(CVE-2015-0288)
77+
[Stephen Henson]
78+
79+
*) Removed the export ciphers from the DEFAULT ciphers
80+
[Kurt Roeckx]
81+
82+
Changes between 1.0.1k and 1.0.1l [15 Jan 2015]
83+
84+
*) Build fixes for the Windows and OpenVMS platforms
85+
[Matt Caswell and Richard Levitte]
86+
587
Changes between 1.0.1j and 1.0.1k [8 Jan 2015]
688

789
*) Fix DTLS segmentation fault in dtls1_get_record. A carefully crafted DTLS
@@ -766,63 +848,6 @@
766848
Add command line options to s_client/s_server.
767849
[Steve Henson]
768850

769-
Changes between 1.0.0j and 1.0.0k [5 Feb 2013]
770-
771-
*) Make the decoding of SSLv3, TLS and DTLS CBC records constant time.
772-
773-
This addresses the flaw in CBC record processing discovered by
774-
Nadhem Alfardan and Kenny Paterson. Details of this attack can be found
775-
at: http://www.isg.rhul.ac.uk/tls/
776-
777-
Thanks go to Nadhem Alfardan and Kenny Paterson of the Information
778-
Security Group at Royal Holloway, University of London
779-
(www.isg.rhul.ac.uk) for discovering this flaw and Adam Langley and
780-
Emilia K�sper for the initial patch.
781-
(CVE-2013-0169)
782-
[Emilia K�sper, Adam Langley, Ben Laurie, Andy Polyakov, Steve Henson]
783-
784-
*) Return an error when checking OCSP signatures when key is NULL.
785-
This fixes a DoS attack. (CVE-2013-0166)
786-
[Steve Henson]
787-
788-
*) Call OCSP Stapling callback after ciphersuite has been chosen, so
789-
the right response is stapled. Also change SSL_get_certificate()
790-
so it returns the certificate actually sent.
791-
See http://rt.openssl.org/Ticket/Display.html?id=2836.
792-
(This is a backport)
793-
[Rob Stradling <[email protected]>]
794-
795-
*) Fix possible deadlock when decoding public keys.
796-
[Steve Henson]
797-
798-
Changes between 1.0.0i and 1.0.0j [10 May 2012]
799-
800-
[NB: OpenSSL 1.0.0i and later 1.0.0 patch levels were released after
801-
OpenSSL 1.0.1.]
802-
803-
*) Sanity check record length before skipping explicit IV in DTLS
804-
to fix DoS attack.
805-
806-
Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic
807-
fuzzing as a service testing platform.
808-
(CVE-2012-2333)
809-
[Steve Henson]
810-
811-
*) Initialise tkeylen properly when encrypting CMS messages.
812-
Thanks to Solar Designer of Openwall for reporting this issue.
813-
[Steve Henson]
814-
815-
Changes between 1.0.0h and 1.0.0i [19 Apr 2012]
816-
817-
*) Check for potentially exploitable overflows in asn1_d2i_read_bio
818-
BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer
819-
in CRYPTO_realloc_clean.
820-
821-
Thanks to Tavis Ormandy, Google Security Team, for discovering this
822-
issue and to Adam Langley <[email protected]> for fixing it.
823-
(CVE-2012-2110)
824-
[Adam Langley (Google), Tavis Ormandy, Google Security Team]
825-
826851
Changes between 1.0.0g and 1.0.0h [12 Mar 2012]
827852

828853
*) Fix MMA (Bleichenbacher's attack on PKCS #1 v1.5 RSA padding) weakness
@@ -1813,228 +1838,6 @@
18131838
*) Change 'Configure' script to enable Camellia by default.
18141839
[NTT]
18151840

1816-
Changes between 0.9.8x and 0.9.8y [5 Feb 2013]
1817-
1818-
*) Make the decoding of SSLv3, TLS and DTLS CBC records constant time.
1819-
1820-
This addresses the flaw in CBC record processing discovered by
1821-
Nadhem Alfardan and Kenny Paterson. Details of this attack can be found
1822-
at: http://www.isg.rhul.ac.uk/tls/
1823-
1824-
Thanks go to Nadhem Alfardan and Kenny Paterson of the Information
1825-
Security Group at Royal Holloway, University of London
1826-
(www.isg.rhul.ac.uk) for discovering this flaw and Adam Langley and
1827-
Emilia K�sper for the initial patch.
1828-
(CVE-2013-0169)
1829-
[Emilia K�sper, Adam Langley, Ben Laurie, Andy Polyakov, Steve Henson]
1830-
1831-
*) Return an error when checking OCSP signatures when key is NULL.
1832-
This fixes a DoS attack. (CVE-2013-0166)
1833-
[Steve Henson]
1834-
1835-
*) Call OCSP Stapling callback after ciphersuite has been chosen, so
1836-
the right response is stapled. Also change SSL_get_certificate()
1837-
so it returns the certificate actually sent.
1838-
See http://rt.openssl.org/Ticket/Display.html?id=2836.
1839-
(This is a backport)
1840-
[Rob Stradling <[email protected]>]
1841-
1842-
*) Fix possible deadlock when decoding public keys.
1843-
[Steve Henson]
1844-
1845-
Changes between 0.9.8w and 0.9.8x [10 May 2012]
1846-
1847-
*) Sanity check record length before skipping explicit IV in DTLS
1848-
to fix DoS attack.
1849-
1850-
Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic
1851-
fuzzing as a service testing platform.
1852-
(CVE-2012-2333)
1853-
[Steve Henson]
1854-
1855-
*) Initialise tkeylen properly when encrypting CMS messages.
1856-
Thanks to Solar Designer of Openwall for reporting this issue.
1857-
[Steve Henson]
1858-
1859-
Changes between 0.9.8v and 0.9.8w [23 Apr 2012]
1860-
1861-
*) The fix for CVE-2012-2110 did not take into account that the
1862-
'len' argument to BUF_MEM_grow and BUF_MEM_grow_clean is an
1863-
int in OpenSSL 0.9.8, making it still vulnerable. Fix by
1864-
rejecting negative len parameter. (CVE-2012-2131)
1865-
[Tomas Hoger <[email protected]>]
1866-
1867-
Changes between 0.9.8u and 0.9.8v [19 Apr 2012]
1868-
1869-
*) Check for potentially exploitable overflows in asn1_d2i_read_bio
1870-
BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer
1871-
in CRYPTO_realloc_clean.
1872-
1873-
Thanks to Tavis Ormandy, Google Security Team, for discovering this
1874-
issue and to Adam Langley <[email protected]> for fixing it.
1875-
(CVE-2012-2110)
1876-
[Adam Langley (Google), Tavis Ormandy, Google Security Team]
1877-
1878-
Changes between 0.9.8t and 0.9.8u [12 Mar 2012]
1879-
1880-
*) Fix MMA (Bleichenbacher's attack on PKCS #1 v1.5 RSA padding) weakness
1881-
in CMS and PKCS7 code. When RSA decryption fails use a random key for
1882-
content decryption and always return the same error. Note: this attack
1883-
needs on average 2^20 messages so it only affects automated senders. The
1884-
old behaviour can be reenabled in the CMS code by setting the
1885-
CMS_DEBUG_DECRYPT flag: this is useful for debugging and testing where
1886-
an MMA defence is not necessary.
1887-
Thanks to Ivan Nestlerode <[email protected]> for discovering
1888-
this issue. (CVE-2012-0884)
1889-
[Steve Henson]
1890-
1891-
*) Fix CVE-2011-4619: make sure we really are receiving a
1892-
client hello before rejecting multiple SGC restarts. Thanks to
1893-
Ivan Nestlerode <[email protected]> for discovering this bug.
1894-
[Steve Henson]
1895-
1896-
Changes between 0.9.8s and 0.9.8t [18 Jan 2012]
1897-
1898-
*) Fix for DTLS DoS issue introduced by fix for CVE-2011-4109.
1899-
Thanks to Antonio Martin, Enterprise Secure Access Research and
1900-
Development, Cisco Systems, Inc. for discovering this bug and
1901-
preparing a fix. (CVE-2012-0050)
1902-
[Antonio Martin]
1903-
1904-
Changes between 0.9.8r and 0.9.8s [4 Jan 2012]
1905-
1906-
*) Nadhem Alfardan and Kenny Paterson have discovered an extension
1907-
of the Vaudenay padding oracle attack on CBC mode encryption
1908-
which enables an efficient plaintext recovery attack against
1909-
the OpenSSL implementation of DTLS. Their attack exploits timing
1910-
differences arising during decryption processing. A research
1911-
paper describing this attack can be found at:
1912-
http://www.isg.rhul.ac.uk/~kp/dtls.pdf
1913-
Thanks go to Nadhem Alfardan and Kenny Paterson of the Information
1914-
Security Group at Royal Holloway, University of London
1915-
(www.isg.rhul.ac.uk) for discovering this flaw and to Robin Seggelmann
1916-
<[email protected]> and Michael Tuexen <[email protected]>
1917-
for preparing the fix. (CVE-2011-4108)
1918-
[Robin Seggelmann, Michael Tuexen]
1919-
1920-
*) Stop policy check failure freeing same buffer twice. (CVE-2011-4109)
1921-
[Ben Laurie, Kasper <[email protected]>]
1922-
1923-
*) Clear bytes used for block padding of SSL 3.0 records.
1924-
(CVE-2011-4576)
1925-
[Adam Langley (Google)]
1926-
1927-
*) Only allow one SGC handshake restart for SSL/TLS. Thanks to George
1928-
Kadianakis <[email protected]> for discovering this issue and
1929-
Adam Langley for preparing the fix. (CVE-2011-4619)
1930-
[Adam Langley (Google)]
1931-
1932-
*) Prevent malformed RFC3779 data triggering an assertion failure.
1933-
Thanks to Andrew Chi, BBN Technologies, for discovering the flaw
1934-
and Rob Austein <[email protected]> for fixing it. (CVE-2011-4577)
1935-
[Rob Austein <[email protected]>]
1936-
1937-
*) Fix ssl_ciph.c set-up race.
1938-
[Adam Langley (Google)]
1939-
1940-
*) Fix spurious failures in ecdsatest.c.
1941-
[Emilia K�sper (Google)]
1942-
1943-
*) Fix the BIO_f_buffer() implementation (which was mixing different
1944-
interpretations of the '..._len' fields).
1945-
[Adam Langley (Google)]
1946-
1947-
*) Fix handling of BN_BLINDING: now BN_BLINDING_invert_ex (rather than
1948-
BN_BLINDING_invert_ex) calls BN_BLINDING_update, ensuring that concurrent
1949-
threads won't reuse the same blinding coefficients.
1950-
1951-
This also avoids the need to obtain the CRYPTO_LOCK_RSA_BLINDING
1952-
lock to call BN_BLINDING_invert_ex, and avoids one use of
1953-
BN_BLINDING_update for each BN_BLINDING structure (previously,
1954-
the last update always remained unused).
1955-
[Emilia K�sper (Google)]
1956-
1957-
*) Fix SSL memory handling for (EC)DH ciphersuites, in particular
1958-
for multi-threaded use of ECDH.
1959-
[Adam Langley (Google)]
1960-
1961-
*) Fix x509_name_ex_d2i memory leak on bad inputs.
1962-
[Bodo Moeller]
1963-
1964-
*) Add protection against ECDSA timing attacks as mentioned in the paper
1965-
by Billy Bob Brumley and Nicola Tuveri, see:
1966-
1967-
http://eprint.iacr.org/2011/232.pdf
1968-
1969-
[Billy Bob Brumley and Nicola Tuveri]
1970-
1971-
Changes between 0.9.8q and 0.9.8r [8 Feb 2011]
1972-
1973-
*) Fix parsing of OCSP stapling ClientHello extension. CVE-2011-0014
1974-
[Neel Mehta, Adam Langley, Bodo Moeller (Google)]
1975-
1976-
*) Fix bug in string printing code: if *any* escaping is enabled we must
1977-
escape the escape character (backslash) or the resulting string is
1978-
ambiguous.
1979-
[Steve Henson]
1980-
1981-
Changes between 0.9.8p and 0.9.8q [2 Dec 2010]
1982-
1983-
*) Disable code workaround for ancient and obsolete Netscape browsers
1984-
and servers: an attacker can use it in a ciphersuite downgrade attack.
1985-
Thanks to Martin Rex for discovering this bug. CVE-2010-4180
1986-
[Steve Henson]
1987-
1988-
*) Fixed J-PAKE implementation error, originally discovered by
1989-
Sebastien Martini, further info and confirmation from Stefan
1990-
Arentz and Feng Hao. Note that this fix is a security fix. CVE-2010-4252
1991-
[Ben Laurie]
1992-
1993-
Changes between 0.9.8o and 0.9.8p [16 Nov 2010]
1994-
1995-
*) Fix extension code to avoid race conditions which can result in a buffer
1996-
overrun vulnerability: resumed sessions must not be modified as they can
1997-
be shared by multiple threads. CVE-2010-3864
1998-
[Steve Henson]
1999-
2000-
*) Fix for double free bug in ssl/s3_clnt.c CVE-2010-2939
2001-
[Steve Henson]
2002-
2003-
*) Don't reencode certificate when calculating signature: cache and use
2004-
the original encoding instead. This makes signature verification of
2005-
some broken encodings work correctly.
2006-
[Steve Henson]
2007-
2008-
*) ec2_GF2m_simple_mul bugfix: compute correct result if the output EC_POINT
2009-
is also one of the inputs.
2010-
[Emilia K�sper <[email protected]> (Google)]
2011-
2012-
*) Don't repeatedly append PBE algorithms to table if they already exist.
2013-
Sort table on each new add. This effectively makes the table read only
2014-
after all algorithms are added and subsequent calls to PKCS12_pbe_add
2015-
etc are non-op.
2016-
[Steve Henson]
2017-
2018-
Changes between 0.9.8n and 0.9.8o [01 Jun 2010]
2019-
2020-
[NB: OpenSSL 0.9.8o and later 0.9.8 patch levels were released after
2021-
OpenSSL 1.0.0.]
2022-
2023-
*) Correct a typo in the CMS ASN1 module which can result in invalid memory
2024-
access or freeing data twice (CVE-2010-0742)
2025-
[Steve Henson, Ronald Moesbergen <[email protected]>]
2026-
2027-
*) Add SHA2 algorithms to SSL_library_init(). SHA2 is becoming far more
2028-
common in certificates and some applications which only call
2029-
SSL_library_init and not OpenSSL_add_all_algorithms() will fail.
2030-
[Steve Henson]
2031-
2032-
*) VMS fixes:
2033-
Reduce copying into .apps and .test in makevms.com
2034-
Don't try to use blank CA certificate in CA.com
2035-
Allow use of C files from original directories in maketests.com
2036-
[Steven M. Schweda" <[email protected]>]
2037-
20381841
Changes between 0.9.8m and 0.9.8n [24 Mar 2010]
20391842

20401843
*) When rejecting SSL/TLS records due to an incorrect version number, never

0 commit comments

Comments
 (0)