pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/security/openssl
Module Name: pkgsrc
Committed By: adam
Date: Sat Sep 16 02:54:58 UTC 2023
Modified Files:
pkgsrc/security/openssl: Makefile distinfo
Log Message:
openssl: updated to 1.1.1w
Changes between 1.1.1v and 1.1.1w [11 Sep 2023]
*) Fix POLY1305 MAC implementation corrupting XMM registers on Windows.
The POLY1305 MAC (message authentication code) implementation in OpenSSL
does not save the contents of non-volatile XMM registers on Windows 64
platform when calculating the MAC of data larger than 64 bytes. Before
returning to the caller all the XMM registers are set to zero rather than
restoring their previous content. The vulnerable code is used only on newer
x86_64 processors supporting the AVX512-IFMA instructions.
The consequences of this kind of internal application state corruption can
be various - from no consequences, if the calling application does not
depend on the contents of non-volatile XMM registers at all, to the worst
consequences, where the attacker could get complete control of the
application process. However given the contents of the registers are just
zeroized so the attacker cannot put arbitrary values inside, the most likely
consequence, if any, would be an incorrect result of some application
dependent calculations or a crash leading to a denial of service.
(CVE-2023-4807)
[Bernd Edlinger]
Changes between 1.1.1u and 1.1.1v [1 Aug 2023]
*) Fix excessive time spent checking DH q parameter value.
The function DH_check() performs various checks on DH parameters. After
fixing CVE-2023-3446 it was discovered that a large q parameter value can
also trigger an overly long computation during some of these checks.
A correct q value, if present, cannot be larger than the modulus p
parameter, thus it is unnecessary to perform these checks if q is larger
than p.
If DH_check() is called with such q parameter value,
DH_CHECK_INVALID_Q_VALUE return flag is set and the computationally
intensive checks are skipped.
(CVE-2023-3817)
[Tomáš Mráz]
To generate a diff of this commit:
cvs rdiff -u -r1.290 -r1.291 pkgsrc/security/openssl/Makefile
cvs rdiff -u -r1.167 -r1.168 pkgsrc/security/openssl/distinfo
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: pkgsrc/security/openssl/Makefile
diff -u pkgsrc/security/openssl/Makefile:1.290 pkgsrc/security/openssl/Makefile:1.291
--- pkgsrc/security/openssl/Makefile:1.290 Tue Jun 27 10:46:50 2023
+++ pkgsrc/security/openssl/Makefile Sat Sep 16 02:54:58 2023
@@ -1,9 +1,9 @@
-# $NetBSD: Makefile,v 1.290 2023/06/27 10:46:50 riastradh Exp $
+# $NetBSD: Makefile,v 1.291 2023/09/16 02:54:58 adam Exp $
# Remember to upload-distfiles when updating OpenSSL -- otherwise it
# is not possible for users who have bootstrapped without OpenSSL
# to install it and enable HTTPS fetching.
-DISTNAME= openssl-1.1.1u
+DISTNAME= openssl-1.1.1w
CATEGORIES= security
MASTER_SITES= https://www.openssl.org/source/
Index: pkgsrc/security/openssl/distinfo
diff -u pkgsrc/security/openssl/distinfo:1.167 pkgsrc/security/openssl/distinfo:1.168
--- pkgsrc/security/openssl/distinfo:1.167 Tue May 30 14:52:00 2023
+++ pkgsrc/security/openssl/distinfo Sat Sep 16 02:54:58 2023
@@ -1,8 +1,8 @@
-$NetBSD: distinfo,v 1.167 2023/05/30 14:52:00 wiz Exp $
+$NetBSD: distinfo,v 1.168 2023/09/16 02:54:58 adam Exp $
-BLAKE2s (openssl-1.1.1u.tar.gz) = 3be5d53d3d57999fcf6c82184980dc0bb02344d1f7e94c5b0dde2665a1678c7b
-SHA512 (openssl-1.1.1u.tar.gz) = d00aeb0b4c4676deff06ff95af7ac33dd683b92f972b4a8ae55cf384bb37c7ec30ab83c6c0745daf87cf1743a745fced6a347fd11fed4c548aa0953610ed4919
-Size (openssl-1.1.1u.tar.gz) = 9892176 bytes
+BLAKE2s (openssl-1.1.1w.tar.gz) = 22267f203159562dd9916f2d419618fa6cc26d58fadd7963be5c0d92d7deda8e
+SHA512 (openssl-1.1.1w.tar.gz) = b4c625fe56a4e690b57b6a011a225ad0cb3af54bd8fb67af77b5eceac55cc7191291d96a660c5b568a08a2fbf62b4612818e7cca1bb95b2b6b4fc649b0552b6d
+Size (openssl-1.1.1w.tar.gz) = 9893384 bytes
SHA1 (patch-Configurations_shared-info.pl) = 0e835f6e343b5d05ef9a0e6ef2a195201262d15c
SHA1 (patch-Configurations_unix-Makefile.tmpl) = 3f47dd453381485aeb6c37dc53f932428fdcef50
SHA1 (patch-Configure) = 479f1bc826f7721f6b44d6b5a6cf460432924bf2
Home |
Main Index |
Thread Index |
Old Index