Skip to content

Update OpenSSL from 1.1.1b to 1.1.1c #1124

Merged
merged 1 commit into from
Jun 3, 2019

Commits on May 31, 2019

  1. openssl1: Update version from 1.1.1b to 1.1.1c

    From the [news][1]:
    
    > Changes between 1.1.1b and 1.1.1c [28 May 2019]
    >
    >   *) Add build tests for C++.  These are generated files that only do one
    >      thing, to include one public OpenSSL head file each.  This tests that
    >      the public header files can be usefully included in a C++ application.
    >
    >      This test isn't enabled by default.  It can be enabled with the option
    >      'enable-buildtest-c++'.
    >      [Richard Levitte]
    >
    >   *) Enable SHA3 pre-hashing for ECDSA and DSA.
    >      [Patrick Steuer]
    >
    >   *) Change the default RSA, DSA and DH size to 2048 bit instead of 1024.
    >      This changes the size when using the genpkey app when no size is given. It
    >      fixes an omission in earlier changes that changed all RSA, DSA and DH
    >      generation apps to use 2048 bits by default.
    >      [Kurt Roeckx]
    >
    >   *) Reorganize the manual pages to consistently have RETURN VALUES,
    >      EXAMPLES, SEE ALSO and HISTORY come in that order, and adjust
    >      util/fix-doc-nits accordingly.
    >      [Paul Yang, Joshua Lock]
    >
    >   *) Add the missing accessor EVP_PKEY_get0_engine()
    >      [Matt Caswell]
    >
    >   *) Have apps like 's_client' and 's_server' output the signature scheme
    >      along with other cipher suite parameters when debugging.
    >      [Lorinczy Zsigmond]
    >
    >   *) Make OPENSSL_config() error agnostic again.
    >      [Richard Levitte]
    >
    >   *) Do the error handling in RSA decryption constant time.
    >      [Bernd Edlinger]
    >
    >   *) Prevent over long nonces in ChaCha20-Poly1305.
    >
    >      ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input
    >      for every encryption operation. RFC 7539 specifies that the nonce value
    >      (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length
    >      and front pads the nonce with 0 bytes if it is less than 12
    >      bytes. However it also incorrectly allows a nonce to be set of up to 16
    >      bytes. In this case only the last 12 bytes are significant and any
    >      additional leading bytes are ignored.
    >
    >      It is a requirement of using this cipher that nonce values are
    >      unique. Messages encrypted using a reused nonce value are susceptible to
    >      serious confidentiality and integrity attacks. If an application changes
    >      the default nonce length to be longer than 12 bytes and then makes a
    >      change to the leading bytes of the nonce expecting the new value to be a
    >      new unique nonce then such an application could inadvertently encrypt
    >      messages with a reused nonce.
    >
    >      Additionally the ignored bytes in a long nonce are not covered by the
    >      integrity guarantee of this cipher. Any application that relies on the
    >      integrity of these ignored leading bytes of a long nonce may be further
    >      affected. Any OpenSSL internal use of this cipher, including in SSL/TLS,
    >      is safe because no such use sets such a long nonce value. However user
    >      applications that use this cipher directly and set a non-default nonce
    >      length to be longer than 12 bytes may be vulnerable.
    >
    >      This issue was reported to OpenSSL on 16th of March 2019 by Joran Dirk
    >      Greef of Ronomon.
    >      (CVE-2019-1543)
    >      [Matt Caswell]
    >
    >   *) Ensure that SM2 only uses SM3 as digest algorithm
    >      [Paul Yang]
    
    [1]: https://www.openssl.org/news/cl111.txt
    pmenzel committed May 31, 2019
    Configuration menu
    Copy the full SHA
    f4b5636 View commit details
    Browse the repository at this point in the history