Package: openssl / 0.9.8o-4squeeze23
Metadata
| Package | Version | Patches format |
|---|---|---|
| openssl | 0.9.8o-4squeeze23 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| CVE 2014 3567.patch | (download) |
ssl/t1_lib.c |
3 3 + 0 - 0 ! |
--- |
| CVE 2014 3569.patch | (download) |
ssl/s23_srvr.c |
6 4 + 2 - 0 ! |
--- |
| 0001 Return error when a bit string indicates an invalid .patch | (download) |
crypto/asn1/a_bitstr.c |
7 6 + 1 - 0 ! |
[patch 01/15] return error when a bit string indicates an invalid amount of bits left |
| 0002 Add ASN1_TYPE_cmp and X509_ALGOR_cmp.patch | (download) |
crypto/asn1/a_type.c |
46 46 + 0 - 0 ! |
[patch 02/15] add asn1_type_cmp and x509_algor_cmp. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit (these are needed for certificate fingerprint fixes) |
| 0004 Fix various certificate fingerprint issues.patch | (download) |
crypto/asn1/a_verify.c |
12 12 + 0 - 0 ! |
[patch 04/15] fix various certificate fingerprint issues. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit By using non-DER or invalid encodings outside the signed portion of a certificate the fingerprint can be changed without breaking the signature. Although no details of the signed portion of the certificate can be changed this can cause problems with some applications: e.g. those using the certificate fingerprint for blacklists. 1. Reject signatures with non zero unused bits. If the BIT STRING containing the signature has non zero unused bits reject the signature. All current signature algorithms require zero unused bits. 2. Check certificate algorithm consistency. Check the AlgorithmIdentifier inside TBS matches the one in the certificate signature. NB: this will result in signature failure errors for some broken certificates. 3. Check DSA/ECDSA signatures use DER. Reencode DSA/ECDSA signatures and compare with the original received signature. Return an error if there is a mismatch. This will reject various cases including garbage after signature (thanks to Antti Karjalainen and Tuomo Untinen from the Codenomicon CROSS program for discovering this case) and use of BER or invalid ASN.1 INTEGERs (negative or with leading zeroes). CVE-2014-8275 |
| 0005 ECDH downgrade bug fix.patch | (download) |
ssl/s3_clnt.c |
15 13 + 2 - 0 ! |
[patch 05/15] ecdh downgrade bug fix. Fix bug where an OpenSSL client would accept a handshake using an ephemeral ECDH ciphersuites with the server key exchange message omitted. Thanks to Karthikeyan Bhargavan for reporting this issue. CVE-2014-3572 |
| 0006 Only allow ephemeral RSA keys in export ciphersuites.patch | (download) |
doc/ssl/SSL_CTX_set_options.pod |
10 1 + 9 - 0 ! |
[patch 06/15] only allow ephemeral rsa keys in export ciphersuites. OpenSSL clients would tolerate temporary RSA keys in non-export ciphersuites. It also had an option SSL_OP_EPHEMERAL_RSA which enabled this server side. Remove both options as they are a protocol violation. Thanks to Karthikeyan Bhargavan for reporting this issue. (CVE-2015-0204) |
| 0007 use correct function name.patch | (download) |
crypto/asn1/a_verify.c |
2 1 + 1 - 0 ! |
[patch 07/15] use correct function name |
| 0009 fix error discrepancy.patch | (download) |
ssl/s3_clnt.c |
2 1 + 1 - 0 ! |
[patch 09/15] fix error discrepancy |
| 0010 Fix for CVE 2014 3570.patch | (download) |
crypto/bn/asm/mips3.s |
514 257 + 257 - 0 ! |
[patch 10/15] fix for cve-2014-3570. |
| 0011 Fix crash in dtls1_get_record whilst in the listen s.patch | (download) |
ssl/d1_pkt.c |
2 0 + 2 - 0 ! |
[patch 11/15] fix crash in dtls1_get_record whilst in the listen state where you get two separate reads performed - one for the header and one for the body of the handshake record. CVE-2014-3571 |
| 0012 Follow on from CVE 2014 3571. This fixes the code th.patch | (download) |
ssl/d1_pkt.c |
3 2 + 1 - 0 ! |
[patch 12/15] follow on from cve-2014-3571. this fixes the code that was the original source of the crash due to p being NULL. Steve's fix prevents this situation from occuring - however this is by no means obvious by looking at the code for dtls1_get_record. This fix just makes things look a bit more sane. Conflicts: ssl/d1_pkt.c |
| 0013 Fix typo.patch | (download) |
ssl/s3_srvr.c |
2 1 + 1 - 0 ! |
[patch 13/15] fix typo. Fix typo in ssl3_get_cert_verify: we can only skip certificate verify message if certificate is absent. NB: OpenSSL 0.9.8 is NOT vulnerable to CVE-2015-0205 as it doesn't support DH certificates and this typo prohibits skipping of certificate verify message for sign only certificates anyway. |
| 0006 Fix reachable assert in SSLv2 servers.patch | (download) |
ssl/s2_lib.c |
2 1 + 1 - 0 ! |
[patch 6/6] fix reachable assert in sslv2 servers. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This assert is reachable for servers that support SSLv2 and export ciphers. Therefore, such servers can be DoSed by sending a specially crafted SSLv2 CLIENT-MASTER-KEY. Also fix s2_srvr.c to error out early if the key lengths are malformed. These lengths are sent unencrypted, so this does not introduce an oracle. CVE-2015-0293 This issue was discovered by Sean Burford (Google) and Emilia Ksper of the OpenSSL development team. |
| 0009 Fix unsigned signed warnings.patch | (download) |
ssl/s2_srvr.c |
9 5 + 4 - 0 ! |
[patch 09/12] fix unsigned/signed warnings Fix some unsigned/signed warnings introduced as part of the fix for CVE-2015-0293 |
| 0005 PKCS 7 avoid NULL pointer dereferences with missing .patch | (download) |
crypto/pkcs7/pk7_doit.c |
57 57 + 0 - 0 ! |
[patch] pkcs#7: avoid null pointer dereferences with missing content In PKCS#7, the ASN.1 content component is optional. This typically applies to inner content (detached signatures), however we must also handle unexpected missing outer content correctly. This patch only addresses functions reachable from parsing, decryption and verification, and functions otherwise associated with reading potentially untrusted data. Correcting all low-level API calls requires further work. CVE-2015-0289 Thanks to Michal Zalewski (Google) for reporting this issue. |
| 0004 Fix ASN1_TYPE_cmp.patch | (download) |
crypto/asn1/a_type.c |
3 3 + 0 - 0 ! |
[patch 4/6] fix asn1_type_cmp Fix segmentation violation when ASN1_TYPE_cmp is passed a boolean type. This can be triggered during certificate verification so could be a DoS attack against a client or a server enabling client authentication. CVE-2015-0286 |
| 0002 Free up ADB and CHOICE if already initialised.patch | (download) |
crypto/asn1/tasn_dec.c |
24 21 + 3 - 0 ! |
[patch 2/6] free up adb and choice if already initialised. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit CVE-2015-0287 |
| 0001 Fix a failure to NULL a pointer freed on error.patch | (download) |
crypto/ec/ec_asn1.c |
6 3 + 3 - 0 ! |
[patch] fix a failure to null a pointer freed on error. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Inspired by BoringSSL commit 517073cd4b by Eric Roman <eroman@chromium.org> CVE-2015-0209 |
| 0001 Check public key is not NULL.patch | (download) |
crypto/x509/x509_req.c |
2 2 + 0 - 0 ! |
[patch] check public key is not null. CVE-2015-0288 PR#3708 |
| 0001 evp prevent underflow in base64 decoding.patch | (download) |
crypto/evp/encode.c |
1 1 + 0 - 0 ! |
[patch] evp: prevent underflow in base64 decoding This patch resolves RT ticket #2608. Thanks to Robert Dugal for originally spotting this, and to David Ramos for noticing that the ball had been dropped. Signed-off-by: Geoff Thorpe <geoff@openssl.org> |
| 0008 Fix a failure to NULL a pointer freed on error.patch | (download) |
crypto/asn1/x_x509.c |
12 11 + 1 - 0 ! |
[patch 08/12] fix a failure to null a pointer freed on error. Reported by the LibreSSL project as a follow on to CVE-2015-0209 |
| 0001 Disable export and SSLv2 ciphers by default.patch | (download) |
doc/apps/ciphers.pod |
2 1 + 1 - 0 ! |
[patch] disable export and sslv2 ciphers by default They are moved to the COMPLEMENTOFDEFAULT instead. |
| CVE 2014 8176.patch | (download) |
ssl/d1_lib.c |
10 7 + 3 - 0 ! |
[patch] free up s->d1->buffered_app_data.q properly. PR#3286 (cherry picked from commit 71e95000afb2227fe5cac1c79ae884338bcd8d0b) |
| CVE 2015 4000.patch | (download) |
ssl/s3_clnt.c |
33 20 + 13 - 0 ! |
[patch] client: reject handshakes with dh parameters < 768 bits. Since the client has no way of communicating her supported parameter range to the server, connections to servers that choose weak DH will simply fail. |
| CVE 2015 1789.patch | (download) |
crypto/x509/x509_vfy.c |
77 58 + 19 - 0 ! |
[patch] fix length checks in x509_cmp_time to avoid out-of-bounds reads. Also tighten X509_cmp_time to reject more than three fractional seconds in the time; and to reject trailing garbage after the offset. CVE-2015-1789 |
| CVE 2015 1792.patch | (download) |
crypto/cms/cms_smime.c |
2 1 + 1 - 0 ! |
[patch] fix infinite loop in cms Fix loop in do_free_upto if cmsbio is NULL: this will happen when attempting to verify and a digest is not recognised. Reported by Johannes Bauer. CVE-2015-1792 |
| CVE 2015 1791.patch | (download) |
ssl/s3_clnt.c |
32 32 + 0 - 0 ! |
--- |
| CVE 2015 1790.patch | (download) |
crypto/pkcs7/pk7_doit.c |
16 15 + 1 - 0 ! |
[patch] pkcs#7: fix null dereference with missing encryptedcontent. CVE-2015-1790 |
| CVE 2015 3195.patch | (download) |
crypto/asn1/tasn_dec.c |
7 5 + 2 - 0 ! |
[patch 1/2] fix leak with asn.1 combine. When parsing a combined structure pass a flag to the decode routine so on error a pointer to the parent structure is not zeroed as this will leak any additional components in the parent. This can leak memory in any application parsing PKCS#7 or CMS structures. CVE-2015-3195. Thanks to Adam Langley (Google/BoringSSL) for discovering this bug using libFuzzer. PR#4131 |
| Always generate DH keys for ephemeral DH cipher suit.patch | (download) |
ssl/s3_lib.c |
18 0 + 18 - 0 ! |
[patch 1/2] always generate dh keys for ephemeral dh cipher suites Modified version of the commit ffaef3f15 in the master branch by Stephen Henson. This makes the SSL_OP_SINGLE_DH_USE option a no-op and always generates a new DH key for every handshake regardless. This is a follow on from CVE-2016-0701. This branch is not impacted by that CVE because it does not support X9.42 style parameters. It is still possible to generate parameters based on primes that are not "safe", although by default OpenSSL does not do this. The documentation does sign post that using such parameters is unsafe if the private DH key is reused. However to avoid accidental problems or future attacks this commit has been backported to this branch. Issue reported by Antonio Sanso |
| CVE 2015 3197.patch | (download) |
ssl/s2_srvr.c |
15 13 + 2 - 0 ! |
[patch 2/2] better sslv2 cipher-suite enforcement Based on patch by: Nimrod Aviram <nimrod.aviram@gmail.com> CVE-2015-3197 |
