Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

(23.11) openssl_3: 3.0.13 -> 3.0.14; openssl_3_1: 3.1.5 -> 3.1.6 #318322

Merged

Conversation

thillux
Copy link
Contributor

@thillux thillux commented Jun 8, 2024

Description of changes

openssl_3: 3.0.13 -> 3.0.14

Changelog: https://github.com/openssl/openssl/blob/openssl-3.0/CHANGES.md#changes-between-3013-and-3014-4-jun-2024

CVEs fixed:

  • Fixed potential use after free after SSL_free_buffers() is called.
    (CVE-2024-4741)
  • Fixed an issue where checking excessively long DSA keys or parameters may be very slow.
    (CVE-2024-4603)
  • Fixed an issue where some non-default TLS server configurations can cause unbounded
    memory growth when processing TLSv1.3 sessions. An attacker may exploit certain
    server configurations to trigger unbounded memory growth that would lead to a
    Denial of Service.
    (CVE-2024-2511)

openssl_3_1: 3.1.5 -> 3.1.6

Changelog: https://github.com/openssl/openssl/blob/openssl-3.1/CHANGES.md#changes-between-315-and-316-4-jun-2024

CVEs fixed:

  • Fixed potential use after free after SSL_free_buffers() is called.
    (CVE-2024-4741)
  • Fixed an issue where checking excessively long DSA keys or parameters may be very slow.
    (CVE-2024-4603)
  • Fixed an issue where some non-default TLS server configurations can cause unbounded
    memory growth when processing TLSv1.3 sessions. An attacker may exploit certain
    server configurations to trigger unbounded memory growth that would lead to a
    Denial of Service.
    (CVE-2024-2511)

Things done

  • Built on platform(s)
    • x86_64-linux
    • aarch64-linux
    • x86_64-darwin
    • aarch64-darwin
  • For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
    • sandbox = relaxed
    • sandbox = true
  • Tested, as applicable:
  • Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
  • Tested basic functionality of all binary files (usually in ./result/bin/)
  • 24.11 Release Notes (or backporting 23.11 and 24.05 Release notes)
    • (Package updates) Added a release notes entry if the change is major or breaking
    • (Module updates) Added a release notes entry if the change is significant
    • (Module addition) Added a release notes entry if adding a new NixOS module
  • Fits CONTRIBUTING.md.

Add a 👍 reaction to pull requests you find important.

Changelog: https://github.com/openssl/openssl/blob/openssl-3.0/CHANGES.md#changes-between-3013-and-3014-4-jun-2024

CVEs fixed:
- Fixed potential use after free after SSL_free_buffers() is called.
  (CVE-2024-4741)
- Fixed an issue where checking excessively long DSA keys or parameters may be very slow.
  (CVE-2024-4603)
- Fixed an issue where some non-default TLS server configurations can cause unbounded
  memory growth when processing TLSv1.3 sessions. An attacker may exploit certain
  server configurations to trigger unbounded memory growth that would lead to a
  Denial of Service.
  (CVE-2024-2511)

Signed-off-by: Markus Theil <theil.markus@gmail.com>
Changelog: https://github.com/openssl/openssl/blob/openssl-3.1/CHANGES.md#changes-between-315-and-316-4-jun-2024

CVEs fixed:
- Fixed potential use after free after SSL_free_buffers() is called.
  (CVE-2024-4741)
- Fixed an issue where checking excessively long DSA keys or parameters may be very slow.
  (CVE-2024-4603)
- Fixed an issue where some non-default TLS server configurations can cause unbounded
  memory growth when processing TLSv1.3 sessions. An attacker may exploit certain
  server configurations to trigger unbounded memory growth that would lead to a
  Denial of Service.
  (CVE-2024-2511)

Signed-off-by: Markus Theil <theil.markus@gmail.com>
@thillux thillux changed the title Mtheil/23.11 openssl update 2024 06 (23.11) openssl_3: 3.0.13 -> 3.0.14; openssl_3_1: 3.1.5 -> 3.1.6 Jun 8, 2024
@thillux thillux marked this pull request as ready for review June 8, 2024 17:16
@risicle
Copy link
Contributor

risicle commented Jun 23, 2024

Bootstrapped macos 12 x86_64 with this up to passthru.tests for each.

Copy link
Contributor

@risicle risicle left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Built openssl_3.tests & openssl_3_1.tests, nixos x86_64. Built `pkgsCross.aarch64-multiplatform variants.

@risicle risicle merged commit 004b2fd into NixOS:staging-23.11 Jun 28, 2024
32 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants