Skip to content

Commit d71517f

Browse files
shigekirvagg
authored andcommitted
deps: upgrade openssl sources to 1.0.2r
This replaces all sources of openssl-1.0.2r.tar.gz into deps/openssl/openssl
1 parent 76d52c5 commit d71517f

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

119 files changed

+813
-40168
lines changed

deps/openssl/openssl/CHANGES

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,33 @@
77
https://github.com/openssl/openssl/commits/ and pick the appropriate
88
release branch.
99

10+
Changes between 1.0.2q and 1.0.2r [26 Feb 2019]
11+
12+
*) 0-byte record padding oracle
13+
14+
If an application encounters a fatal protocol error and then calls
15+
SSL_shutdown() twice (once to send a close_notify, and once to receive one)
16+
then OpenSSL can respond differently to the calling application if a 0 byte
17+
record is received with invalid padding compared to if a 0 byte record is
18+
received with an invalid MAC. If the application then behaves differently
19+
based on that in a way that is detectable to the remote peer, then this
20+
amounts to a padding oracle that could be used to decrypt data.
21+
22+
In order for this to be exploitable "non-stitched" ciphersuites must be in
23+
use. Stitched ciphersuites are optimised implementations of certain
24+
commonly used ciphersuites. Also the application must call SSL_shutdown()
25+
twice even if a protocol error has occurred (applications should not do
26+
this but some do anyway).
27+
28+
This issue was discovered by Juraj Somorovsky, Robert Merget and Nimrod
29+
Aviram, with additional investigation by Steven Collison and Andrew
30+
Hourselt. It was reported to OpenSSL on 10th December 2018.
31+
(CVE-2019-1559)
32+
[Matt Caswell]
33+
34+
*) Move strictness check from EVP_PKEY_asn1_new() to EVP_PKEY_asn1_add0().
35+
[Richard Levitte]
36+
1037
Changes between 1.0.2p and 1.0.2q [20 Nov 2018]
1138

1239
*) Microarchitecture timing vulnerability in ECC scalar multiplication

deps/openssl/openssl/Makefile

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
## Makefile for OpenSSL
55
##
66

7-
VERSION=1.0.2q
7+
VERSION=1.0.2r
88
MAJOR=1
99
MINOR=0.2
1010
SHLIB_VERSION_NUMBER=1.0.0
@@ -521,7 +521,7 @@ $(TARFILE).list:
521521
find * \! -name STATUS \! -name TABLE \! -name '*.o' \! -name '*.a' \
522522
\! -name '*.so' \! -name '*.so.*' \! -name 'openssl' \
523523
\( \! -name '*test' -o -name bctest -o -name pod2mantest \) \
524-
\! -name '.#*' \! -name '*~' \! -type l \
524+
\! -name '.#*' \! -name '*.bak' \! -name '*~' \! -type l \
525525
| sort > $(TARFILE).list
526526

527527
tar: $(TARFILE).list

0 commit comments

Comments
 (0)