Merge the 1.1.1k version from Debian

Bug #1939544 reported by Simon Chopin
10
This bug affects 2 people
Affects Status Importance Assigned to Milestone
openssl (Ubuntu)
Fix Released
Wishlist
Simon Chopin

Bug Description

Impish currently ships with a version based on the upstream 1.1.1j, while Debian bullseye/sid has 1.1.1k. Let's merge!

Tags: fr-1605

CVE References

Simon Chopin (schopin)
Changed in openssl (Ubuntu):
assignee: nobody → Simon Chopin (schopin)
status: New → In Progress
tags: added: fr-1605
Revision history for this message
Simon Chopin (schopin) wrote (last edit ):

The merge was easy, as most of the diff in the upstream release comes from patches that we already applied.

A build was uploaded to the following PPA:
https://launchpad.net/~schopin/+archive/ubuntu/test-ppa/+sourcepub/12642810/+listing-archive-extra

Attached is a debdiff from the Ubuntu version, a debdiff against the current Debian version will follow shortly for reference.

Revision history for this message
Simon Chopin (schopin) wrote :

Removed previous patches, as there was a small issue with the changelog (no bug number). Reattaching them now :)

Mathew Hodson (mhodson)
Changed in openssl (Ubuntu):
importance: Undecided → Wishlist
Changed in openssl (Ubuntu):
status: In Progress → Fix Committed
Revision history for this message
Brian Murray (brian-murray) wrote :

I'm unsubscribing the sponsors team given that this is in -proposed.

Revision history for this message
Dimitri John Ledkov (xnox) wrote :

Please merge 1.1.1l with the CVE fixes

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package openssl - 1.1.1k-1ubuntu1

---------------
openssl (1.1.1k-1ubuntu1) impish; urgency=low

  * Merge from Debian unstable (LP: #1939544). Remaining changes:
    - Replace duplicate files in the doc directory with symlinks.
    - debian/libssl1.1.postinst:
      + Display a system restart required notification on libssl1.1
        upgrade on servers, unless needrestart is available.
      + Use a different priority for libssl1.1/restart-services depending
        on whether a desktop, or server dist-upgrade is being performed.
      + Skip services restart & reboot notification if needrestart is in-use.
      + Bump version check to to 1.1.1.
      + Import libraries/restart-without-asking template as used by above.
    - Revert "Enable system default config to enforce TLS1.2 as a
      minimum" & "Increase default security level from 1 to 2".
    - Reword the NEWS entry, as applicable on Ubuntu.
    - Cherrypick s390x SIMD acceleration patches for poly1305 and chacha20
      and ECC from master.
    - Use perl:native in the autopkgtest for installability on i386.
    - Set OPENSSL_TLS_SECURITY_LEVEL=2 as compiled-in minimum security
      level. Change meaning of SECURITY_LEVEL=2 to prohibit TLS versions
      below 1.2 and update documentation. Previous default of 1, can be set
      by calling SSL_CTX_set_security_level(), SSL_set_security_level() or
      using ':@SECLEVEL=1' CipherString value in openssl.cfg.
    - Import https://github.com/openssl/openssl/pull/12272.patch to enable
      CET.
    - Add support for building with noudeb build profile.
  * Dropped changes, superseded upstream:
    - SECURITY UPDATE: NULL pointer deref in signature_algorithms processing
      -> CVE-2021-3449
    - SECURITY UPDATE: CA cert check bypass with X509_V_FLAG_X509_STRICT
      -> CVE-2021-3450

openssl (1.1.1k-1) unstable; urgency=medium

  * New upstream version.
    - CVE-2021-3450 (CA certificate check bypass with X509_V_FLAG_X509_STRICT).
    - CVE-2021-3449 (NULL pointer deref in signature_algorithms processing).

 -- Simon Chopin <email address hidden> Wed, 11 Aug 2021 13:00:48 +0200

Changed in openssl (Ubuntu):
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.