Received: by mail.netbsd.org (Postfix, from userid 605) id E9CEF84D96; Thu, 25 Mar 2021 16:36:20 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 3165F84D93 for ; Thu, 25 Mar 2021 16:36:20 +0000 (UTC) X-Virus-Scanned: amavisd-new at netbsd.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.netbsd.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id 1DCbzZCxqRYa for ; Thu, 25 Mar 2021 16:36:19 +0000 (UTC) Received: from cvs.NetBSD.org (ivanova.netbsd.org [199.233.217.197]) by mail.netbsd.org (Postfix) with ESMTP id 835CD84CEC for ; Thu, 25 Mar 2021 16:36:19 +0000 (UTC) Received: by cvs.NetBSD.org (Postfix, from userid 500) id 807FCFA95; Thu, 25 Mar 2021 16:36:19 +0000 (UTC) Content-Transfer-Encoding: 7bit Content-Type: multipart/mixed; boundary="_----------=_161669017967600" MIME-Version: 1.0 Date: Thu, 25 Mar 2021 16:36:19 +0000 From: "Jonathan Perkin" Subject: CVS commit: pkgsrc/security/openssl To: pkgsrc-changes@NetBSD.org Reply-To: jperkin@netbsd.org X-Mailer: log_accum Message-Id: <20210325163619.807FCFA95@cvs.NetBSD.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: Precedence: bulk List-Unsubscribe: This is a multi-part message in MIME format. --_----------=_161669017967600 Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="UTF-8" Module Name: pkgsrc Committed By: jperkin Date: Thu Mar 25 16:36:19 UTC 2021 Modified Files: pkgsrc/security/openssl: Makefile distinfo Log Message: openssl: Update to 1.1.1k. Approved by @wiz during freeze. Changes between 1.1.1j and 1.1.1k [25 Mar 2021] *) Fixed a problem with verifying a certificate chain when using the X509_V_FLAG_X509_STRICT flag. This flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. (CVE-2021-3450) [Tomáš Mráz] *) Fixed an issue where an OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. (CVE-2021-3449) [Peter Kästle and Samuel Sapalski] To generate a diff of this commit: cvs rdiff -u -r1.268 -r1.269 pkgsrc/security/openssl/Makefile cvs rdiff -u -r1.148 -r1.149 pkgsrc/security/openssl/distinfo Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files. --_----------=_161669017967600 Content-Disposition: inline Content-Length: 1889 Content-Transfer-Encoding: binary Content-Type: text/x-diff; charset=us-ascii Modified files: Index: pkgsrc/security/openssl/Makefile diff -u pkgsrc/security/openssl/Makefile:1.268 pkgsrc/security/openssl/Makefile:1.269 --- pkgsrc/security/openssl/Makefile:1.268 Sat Feb 20 08:53:23 2021 +++ pkgsrc/security/openssl/Makefile Thu Mar 25 16:36:19 2021 @@ -1,6 +1,6 @@ -# $NetBSD: Makefile,v 1.268 2021/02/20 08:53:23 wiz Exp $ +# $NetBSD: Makefile,v 1.269 2021/03/25 16:36:19 jperkin Exp $ -DISTNAME= openssl-1.1.1j +DISTNAME= openssl-1.1.1k CATEGORIES= security MASTER_SITES= https://www.openssl.org/source/ Index: pkgsrc/security/openssl/distinfo diff -u pkgsrc/security/openssl/distinfo:1.148 pkgsrc/security/openssl/distinfo:1.149 --- pkgsrc/security/openssl/distinfo:1.148 Sat Feb 20 08:53:23 2021 +++ pkgsrc/security/openssl/distinfo Thu Mar 25 16:36:19 2021 @@ -1,9 +1,9 @@ -$NetBSD: distinfo,v 1.148 2021/02/20 08:53:23 wiz Exp $ +$NetBSD: distinfo,v 1.149 2021/03/25 16:36:19 jperkin Exp $ -SHA1 (openssl-1.1.1j.tar.gz) = 04c340b086828eecff9df06dceff196790bb9268 -RMD160 (openssl-1.1.1j.tar.gz) = b88dd6c2f1587a2cf9e5670f697343808dc80ea6 -SHA512 (openssl-1.1.1j.tar.gz) = 51e44995663b5258b0018bdc1e2b0e7e8e0cce111138ca1f80514456af920fce4e409a411ce117c0f3eb9190ac3e47c53a43f39b06acd35b7494e2bec4a607d5 -Size (openssl-1.1.1j.tar.gz) = 9823161 bytes +SHA1 (openssl-1.1.1k.tar.gz) = bad9dc4ae6dcc1855085463099b5dacb0ec6130b +RMD160 (openssl-1.1.1k.tar.gz) = 5c9fbbeae7d115e59be705162e58195517a37cae +SHA512 (openssl-1.1.1k.tar.gz) = 73cd042d4056585e5a9dd7ab68e7c7310a3a4c783eafa07ab0b560e7462b924e4376436a6d38a155c687f6942a881cfc0c1b9394afcde1d8c46bf396e7d51121 +Size (openssl-1.1.1k.tar.gz) = 9823400 bytes SHA1 (patch-Configurations_shared-info.pl) = 0e835f6e343b5d05ef9a0e6ef2a195201262d15c SHA1 (patch-Configurations_unix-Makefile.tmpl) = cf6b46c6e10e84100beb468bbe6f85c5e62cbe7a SHA1 (patch-Configure) = 479f1bc826f7721f6b44d6b5a6cf460432924bf2 --_----------=_161669017967600--