From openssl at openssl.org Thu Dec 3 15:51:37 2015 From: openssl at openssl.org (OpenSSL) Date: Thu, 3 Dec 2015 15:51:37 +0000 Subject: [openssl-announce] OpenSSL version 0.9.8zh released Message-ID: <20151203155137.GA29017@openssl.org> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 OpenSSL version 0.9.8zh released =============================== OpenSSL - The Open Source toolkit for SSL/TLS http://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 0.9.8zh of our open source toolkit for SSL/TLS. For details of changes and known issues see the release notes at: http://www.openssl.org/news/openssl-0.9.8-notes.html OpenSSL 0.9.8zh is available for download via HTTP and FTP from the following master locations (you can find the various FTP mirrors under http://www.openssl.org/source/mirror.html): * http://www.openssl.org/source/ * ftp://ftp.openssl.org/source/ The distribution file name is: o openssl-0.9.8zh.tar.gz Size: 3817665 MD5 checksum: c00f014c64dfac1ec40dc7459d9673e6 SHA1 checksum: 77cc99e7c83794a212bc7b047480d8288addf9df SHA256 checksum: ea1a43a47900b90e014360572d752f85617fb119fa048800872c1b37db04fad3 The checksums were calculated using the following commands: openssl md5 openssl-0.9.8zh.tar.gz openssl sha1 openssl-0.9.8zh.tar.gz openssl sha256 openssl-0.9.8zh.tar.gz Yours, The OpenSSL Project Team. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJWYFkEAAoJENnE0m0OYESRs8MIAJNsinLBj9zDUwXMMO7f289r oOfwzhCsnjdNb40N5/j6EEiqYC3TwuFBEm6BD59Jr8R7GaUthpFoc8isIAMu+xYS rNFCneu8cM4vX23Wefg7e9MC0RAOG2GTlYmmbxDUXQUv3z+LX/DNc1rxCcOPbnf1 1TQdAiXBpU14kXNuauFbxj9y2mHslkmaiE/4riaQZKgMOU9oJKbMH/aDGHZjmzaf AEeLV0i51JxjUQ3aLvOYZnn+fSxPTJDkv3U3n2+sUYfPwqxTp365VKJ240YbjIx+ llYgloiU1chJo09hBBp+HavaBNcB1uorvsRCKo1PDYxQt4qeFirfM3VNJ1fESug= =Q6ea -----END PGP SIGNATURE----- From openssl at openssl.org Thu Dec 3 15:52:17 2015 From: openssl at openssl.org (OpenSSL) Date: Thu, 3 Dec 2015 15:52:17 +0000 Subject: [openssl-announce] OpenSSL version 1.0.0t released Message-ID: <20151203155217.GA29510@openssl.org> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 OpenSSL version 1.0.0t released =============================== OpenSSL - The Open Source toolkit for SSL/TLS http://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 1.0.0t of our open source toolkit for SSL/TLS. For details of changes and known issues see the release notes at: http://www.openssl.org/news/openssl-1.0.0-notes.html OpenSSL 1.0.0t is available for download via HTTP and FTP from the following master locations (you can find the various FTP mirrors under http://www.openssl.org/source/mirror.html): * http://www.openssl.org/source/ * ftp://ftp.openssl.org/source/ The distribution file name is: o openssl-1.0.0t.tar.gz Size: 4091806 MD5 checksum: 62f5f2127c9bdd3d2768c78c8306039e SHA1 checksum: 949ecd8aa821b0cc5fde12862e4dde33c0320682 SHA256 checksum: 7ce1c3cab7a33bf494330074f70039a10856a972f6b8c430ef4b73db844bde50 The checksums were calculated using the following commands: openssl md5 openssl-1.0.0t.tar.gz openssl sha1 openssl-1.0.0t.tar.gz openssl sha256 openssl-1.0.0t.tar.gz Yours, The OpenSSL Project Team. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJWYFgZAAoJENnE0m0OYESRXuEH/iRgWMcdta23AqUGiPEhBZs0 GWj9VY85g0477EsWqS2wz+kYlnIcbXLGnt1IlPvuXv++VboAyhAyGVpqGMyvka8q pxLxUM7wDdUpdSCV/+wKrbF1nmZCYIhQFdbLHwGKw195+vWM/PlDUGpKTBfrZECf HaBF4FsrRnGew4ZIORyvJSD49/Qc8GCygR5ZB3+cGguCjo/+pCRgAA75DeTxbkjb hf7xZ/8umZZdBgE+ZsPu5+aM8pMKsTc42bv4cPqqwGvygEJPWyMEL16rkomOVshe m6vXPLFYcNNkd4JEUWpZRMQEelpw8/kKSu8ZGNZ3G3RW4EJipMuN7nxUSEmVvfE= =6tot -----END PGP SIGNATURE----- From openssl at openssl.org Thu Dec 3 15:53:30 2015 From: openssl at openssl.org (OpenSSL) Date: Thu, 3 Dec 2015 15:53:30 +0000 Subject: [openssl-announce] OpenSSL version 1.0.1q released Message-ID: <20151203155330.GA30297@openssl.org> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 OpenSSL version 1.0.1q released =============================== OpenSSL - The Open Source toolkit for SSL/TLS http://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 1.0.1q of our open source toolkit for SSL/TLS. For details of changes and known issues see the release notes at: http://www.openssl.org/news/openssl-1.0.1-notes.html OpenSSL 1.0.1q is available for download via HTTP and FTP from the following master locations (you can find the various FTP mirrors under http://www.openssl.org/source/mirror.html): * http://www.openssl.org/source/ * ftp://ftp.openssl.org/source/ The distribution file name is: o openssl-1.0.1q.tar.gz Size: 4548189 MD5 checksum: d1221e2f88085b0953670779656b452f SHA1 checksum: 8f390cd667f87d9c393464ff91d42df89a6df3ac SHA256 checksum: 68f3b2f0f1e8da770f89c38eadf7e6c4dbf690fd4bb648f651addd3b92a9ddf1 The checksums were calculated using the following commands: openssl md5 openssl-1.0.1q.tar.gz openssl sha1 openssl-1.0.1q.tar.gz openssl sha256 openssl-1.0.1q.tar.gz Yours, The OpenSSL Project Team. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJWYFa1AAoJENnE0m0OYESRUnQIAKtEW4xb1nGTdJmGCevAQIS7 GjmIIJsIpKhNGx7j2Cm02F0HFKG6IQOy4gLcl84eNkxkgAnc6D4/H4MroFQQe7/x P9jrWjNqXNtoHKm8OdMUKVFDpzv0AGbVz/3r0XRCPS/zxj5ig8bq7IirrcWx137N /mLgm0OIuNnL99GBSSjUdji4aW50GwCYFZBtr85CdhKU5EMg6hQld6q72VbBBoBi cTRgRnTvl/s1dxqi7DTMTyUXglcYNvm+/QYBKNK10IMXuhhu20MIwUNIy9WVgkCo +bRkdNhHE7A1RklSEQyOCoJXkElTdXDwTElSlYhCdhcgRSX2eM63rOvwm9Zp45s= =9n6L -----END PGP SIGNATURE----- From openssl at openssl.org Thu Dec 3 15:53:46 2015 From: openssl at openssl.org (OpenSSL) Date: Thu, 3 Dec 2015 15:53:46 +0000 Subject: [openssl-announce] OpenSSL version 1.0.2e released Message-ID: <20151203155346.GA30466@openssl.org> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 OpenSSL version 1.0.2e released =============================== OpenSSL - The Open Source toolkit for SSL/TLS http://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 1.0.2e of our open source toolkit for SSL/TLS. For details of changes and known issues see the release notes at: http://www.openssl.org/news/openssl-1.0.2-notes.html OpenSSL 1.0.2e is available for download via HTTP and FTP from the following master locations (you can find the various FTP mirrors under http://www.openssl.org/source/mirror.html): * http://www.openssl.org/source/ * ftp://ftp.openssl.org/source/ The distribution file name is: o openssl-1.0.2e.tar.gz Size: 5255719 MD5 checksum: 2218c1a6f807f7206c11eb3ee3a5ec80 SHA1 checksum: fa4d6e94084e80478d4a7749b97d955e89f04ec2 SHA256 checksum: eee11def03647aa2267434a779608af6fca645023c9a194ddb82f14426835537 The checksums were calculated using the following commands: openssl md5 openssl-1.0.2e.tar.gz openssl sha1 openssl-1.0.2e.tar.gz openssl sha256 openssl-1.0.2e.tar.gz Yours, The OpenSSL Project Team. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJWYFVTAAoJENnE0m0OYESR+VYIAJjA5F9echoXC39pYUw1SmdT DIy2ExFbfXsWJXhoRA2H/OImo9rWxo715BGvkHSNWHZQxXaisFUkB3OLuU0BwGRR U5yUbQDSFIBXH0p2OXKburS7LhzI61SFSirQb4jiRnkohidC9crxl2VDGbeP7yhe M6d1AHwkZp7pnAC8RG3RpzP5sU2oMHPnWTMajAQNZpnrcY0sN4QcW5Ko7kPCHRNv mCUdc1fu2R99HWpky6pySVu5efheGxGDk+W+rjNYDzb1RuFdWStBZTbfEFGI7+ER O63SPMm7bqAkIpfopRsLNpjlHcLpx5C15tj9QQUlTTlTOORq7ZDTFFipY1aYpok= =cM6W -----END PGP SIGNATURE----- From openssl at openssl.org Thu Dec 3 15:57:34 2015 From: openssl at openssl.org (OpenSSL) Date: Thu, 3 Dec 2015 15:57:34 +0000 Subject: [openssl-announce] OpenSSL Security Advisory Message-ID: <20151203155734.GA493@openssl.org> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 OpenSSL Security Advisory [3 Dec 2015] ======================================= NOTE: WE ANTICIPATE THAT 1.0.0t AND 0.9.8zh WILL BE THE LAST RELEASES FOR THE 0.9.8 AND 1.0.0 VERSIONS AND THAT NO MORE SECURITY FIXES WILL BE PROVIDED (AS PER PREVIOUS ANNOUNCEMENTS). USERS ARE ADVISED TO UPGRADE TO LATER VERSIONS. BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193) ================================================================== Severity: Moderate There is a carry propagating bug in the x86_64 Montgomery squaring procedure. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. This issue affects OpenSSL version 1.0.2. OpenSSL 1.0.2 users should upgrade to 1.0.2e This issue was reported to OpenSSL on August 13 2015 by Hanno B??ck. The fix was developed by Andy Polyakov of the OpenSSL development team. Certificate verify crash with missing PSS parameter (CVE-2015-3194) =================================================================== Severity: Moderate The signature verification routines will crash with a NULL pointer dereference if presented with an ASN.1 signature using the RSA PSS algorithm and absent mask generation function parameter. Since these routines are used to verify certificate signature algorithms this can be used to crash any certificate verification operation and exploited in a DoS attack. Any application which performs certificate verification is vulnerable including OpenSSL clients and servers which enable client authentication. This issue affects OpenSSL versions 1.0.2 and 1.0.1. OpenSSL 1.0.2 users should upgrade to 1.0.2e OpenSSL 1.0.1 users should upgrade to 1.0.1q This issue was reported to OpenSSL on August 27 2015 by Lo??c Jonas Etienne (Qnective AG). The fix was developed by Dr. Stephen Henson of the OpenSSL development team. X509_ATTRIBUTE memory leak (CVE-2015-3195) ========================================== Severity: Moderate When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak memory. This structure is used by the PKCS#7 and CMS routines so any application which reads PKCS#7 or CMS data from untrusted sources is affected. SSL/TLS is not affected. This issue affects OpenSSL versions 1.0.2 and 1.0.1, 1.0.0 and 0.9.8. OpenSSL 1.0.2 users should upgrade to 1.0.2e OpenSSL 1.0.1 users should upgrade to 1.0.1q OpenSSL 1.0.0 users should upgrade to 1.0.0t OpenSSL 0.9.8 users should upgrade to 0.9.8zh This issue was reported to OpenSSL on November 9 2015 by Adam Langley (Google/BoringSSL) using libFuzzer. The fix was developed by Dr. Stephen Henson of the OpenSSL development team. Race condition handling PSK identify hint (CVE-2015-3196) ========================================================= Severity: Low If PSK identity hints are received by a multi-threaded client then the values are wrongly updated in the parent SSL_CTX structure. This can result in a race condition potentially leading to a double free of the identify hint data. This issue was fixed in OpenSSL 1.0.2d and 1.0.1p but has not been previously listed in an OpenSSL security advisory. This issue also affects OpenSSL 1.0.0 and has not been previously fixed in an OpenSSL 1.0.0 release. OpenSSL 1.0.2 users should upgrade to 1.0.2d OpenSSL 1.0.1 users should upgrade to 1.0.1p OpenSSL 1.0.0 users should upgrade to 1.0.0t The fix for this issue can be identified in the OpenSSL git repository by commit ids 3c66a669dfc7 (1.0.2), d6be3124f228 (1.0.1) and 1392c238657e (1.0.0). The fix was developed by Dr. Stephen Henson of the OpenSSL development team. Note ==== As per our previous announcements and our Release Strategy (https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions 1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these versions will be provided after that date. In the absence of significant security issues being identified prior to that date, the 1.0.0t and 0.9.8zh releases will be the last for those versions. Users of these versions are advised to upgrade. References ========== URL for this Security Advisory: https://www.openssl.org/news/secadv/20151203.txt Note: the online version of the advisory may be updated with additional details over time. For details of OpenSSL severity classifications please see: https://www.openssl.org/about/secpolicy.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJWYFodAAoJENnE0m0OYESRWZwIALI/Vd1a4QJVCbwkmkx76fUw DguuYXXk6+w59Ie39xA5PN/YJ3PygbIeS/WbFSeZTTlMFyiNMn/B5WSD6Uyfmsm0 pqiyRZZonSXcK7m89D3SaCRw86rAN9K5aVuCM6YQly1A+cuvwhnRJwNVIfzzFYRH 7eWKv8eBBZ+013FQxeiDgNZRPPR69HnHVS3029LXuTuvqqb54TB83ekB6R97eFY5 MoYNzbPrnyRrkDVrcRuAZyblbTUT1jkfrhl+V5f6jtvuAvpbawIk1riwMplIp4Dj mymP7epl5JUfUkdAjXSdOULBL4ps3I7r64JznI5njs+96i4SpcWuDi1mFfzpoLE= =6qxq -----END PGP SIGNATURE----- From matt at openssl.org Thu Dec 3 18:53:21 2015 From: matt at openssl.org (Matt Caswell) Date: Thu, 3 Dec 2015 18:53:21 +0000 Subject: [openssl-announce] OpenSSL version 1.0.2e released (corrected download) Message-ID: <56608FA1.2080403@openssl.org> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Due to an error in the release process the original distribution downloads were failing to build. New downloads have now been made available on the website. Corrected checksums are given below. OpenSSL version 1.0.2e released =============================== OpenSSL - The Open Source toolkit for SSL/TLS http://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 1.0.2e of our open source toolkit for SSL/TLS. For details of changes and known issues see the release notes at: http://www.openssl.org/news/openssl-1.0.2-notes.html OpenSSL 1.0.2e is available for download via HTTP and FTP from the following master locations (you can find the various FTP mirrors under http://www.openssl.org/source/mirror.html): * http://www.openssl.org/source/ * ftp://ftp.openssl.org/source/ The distribution file name is: o openssl-1.0.2e.tar.gz Size: 5256555 MD5 checksum: 5262bfa25b60ed9de9f28d5d52d77fc5 SHA1 checksum: 2c5691496761cb18f98476eefa4d35c835448fb6 SHA256 checksum: e23ccafdb75cfcde782da0151731aa2185195ac745eea3846133f2e05c0e0bff The checksums were calculated using the following commands: openssl md5 openssl-1.0.2e.tar.gz openssl sha1 openssl-1.0.2e.tar.gz openssl sha256 openssl-1.0.2e.tar.gz Yours, The OpenSSL Project Team. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQEcBAEBCAAGBQJWYI+hAAoJENnE0m0OYESRdz8IALIWuYoQnsCnwISeaIDuKMqj VDYdPtJRHz3dLXIal6tHtuqPP/NAq+EY+7WMCufUiCLJaVLOm5baw/G69ksF7RMd yeaLsBw7Lq4B/glSFXfPopi2rY6zmhQV6/DdGQ/BvCH9Z38nH8ZR/GTYR546XN7o GLWyHwe18HEUoRQok7UbGopC2iZPMDah0V7KB3q1fHIOIfeVstw33khNMBBZ7O8R m4SsUyJ1tVgpSv2UB1L2rkxuKPfCYBrS+7sw8ZH2kyNMVeAuHPxcG9LKoDCMSii5 00b0XcIC7MoOXeTmXK93N7NDRRYhKfeJYCSwBBBAshJrGtj27avAZR4jB5PpdsU= =JPLJ -----END PGP SIGNATURE----- From matt at openssl.org Thu Dec 3 18:57:34 2015 From: matt at openssl.org (Matt Caswell) Date: Thu, 3 Dec 2015 18:57:34 +0000 Subject: [openssl-announce] OpenSSL version 1.0.1q released (corrected download) Message-ID: <5660909E.8090403@openssl.org> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Due to an error in the release process the original distribution downloads were failing to build. New downloads have now been made available on the website. Corrected checksums are given below. OpenSSL version 1.0.1q released =============================== OpenSSL - The Open Source toolkit for SSL/TLS http://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 1.0.1q of our open source toolkit for SSL/TLS. For details of changes and known issues see the release notes at: http://www.openssl.org/news/openssl-1.0.1-notes.html OpenSSL 1.0.1q is available for download via HTTP and FTP from the following master locations (you can find the various FTP mirrors under http://www.openssl.org/source/mirror.html): * http://www.openssl.org/source/ * ftp://ftp.openssl.org/source/ The distribution file name is: o openssl-1.0.1q.tar.gz Size: 4549898 MD5 checksum: 54538d0cdcb912f9bc2b36268388205e SHA1 checksum: c65a7bec49b72092d7ebb97a263c496cc1e1d6af SHA256 checksum: b3658b84e9ea606a5ded3c972a5517cd785282e7ea86b20c78aa4b773a047fb7 The checksums were calculated using the following commands: openssl md5 openssl-1.0.1q.tar.gz openssl sha1 openssl-1.0.1q.tar.gz openssl sha256 openssl-1.0.1q.tar.gz Yours, The OpenSSL Project Team. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQEcBAEBCAAGBQJWYJCeAAoJENnE0m0OYESRQqsIAL/W3CN6X1Lm5cySm0ludaxX 7GZTIIjQjoPLu5UFhgHb0MlYFxvU2CgeahpR8wCFI/s10/enGs7bD54chlBJMqZC C+7+QWq6oY45f2Jnb5toGWK7jkWSW6ASkwTfvK086D+XlIGwgokI1cy3nL+UhdVl YHPb5hoR51l6rMQBB3uR1k2SXp3CEanMnJ1vL81gY05gPkc8qGfFaDj7JrteyOcB o+vwqaGg/J6VIPQIlxC46xeANAg6H3uDXHHjbOYyGHdNRhkQHaFx7c85dIHv8WJ5 J1XXcEmAae4Th+LCQkSu7IKr4Qezr0sw2xMnRgne7oytgYQpyY4xbkTdBFoFtTA= =2dkv -----END PGP SIGNATURE----- From matt at openssl.org Thu Dec 3 19:00:51 2015 From: matt at openssl.org (Matt Caswell) Date: Thu, 3 Dec 2015 19:00:51 +0000 Subject: [openssl-announce] OpenSSL version 1.0.0t released (corrected download) Message-ID: <56609163.2070501@openssl.org> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Due to an error in the release process the original distribution downloads were failing to build. New downloads have now been made available on the website. Corrected checksums are given below. OpenSSL version 1.0.0t released =============================== OpenSSL - The Open Source toolkit for SSL/TLS http://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 1.0.0t of our open source toolkit for SSL/TLS. For details of changes and known issues see the release notes at: http://www.openssl.org/news/openssl-1.0.0-notes.html OpenSSL 1.0.0t is available for download via HTTP and FTP from the following master locations (you can find the various FTP mirrors under http://www.openssl.org/source/mirror.html): * http://www.openssl.org/source/ * ftp://ftp.openssl.org/source/ The distribution file name is: o openssl-1.0.0t.tar.gz Size: 4092302 MD5 checksum: 7b7e9f6039a97e4a453b596055912435 SHA1 checksum: ab41cb253405a974063392063a034951a30076e9 SHA256 checksum: 5ab6e348c6c2a95d457e7a00e0aa653bfc7eb4df7b24e7c9ab63163ac0299097 The checksums were calculated using the following commands: openssl md5 openssl-1.0.0t.tar.gz openssl sha1 openssl-1.0.0t.tar.gz openssl sha256 openssl-1.0.0t.tar.gz Yours, The OpenSSL Project Team. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQEcBAEBCAAGBQJWYJFjAAoJENnE0m0OYESR1d8H/3j6OADtQxQY6bLoQ6Nv65OM oztdsyGQz9hU7ttWwaFi/n2h0sC71fRsEVPR2UkewwnCnX4+VyduVZMg+fhMBP5d TyxN7fbNKfRZD7kus3odVIjUrJX/Rp0LdG5+5hc3fPlnvLJ/QSb+jAVZJy6HWLEO 4M5yJOvcPFaiWEuoVnIEhUuJ5K9xfKNk8nwURkA/aiFi88NgI1d/NZ10SX8IjyGV 1Znfe6ck2c09zA09iKLngmbXWDBwXMzFnvtBdk9Xni/Usn1m/fEkf0LehRVy8cKp woVKGUcWKEGt85l6RitjFXkNmMrPuimRiBYoajFQ7JNTPYbUaqh+xtnowSemTbc= =ygoc -----END PGP SIGNATURE----- From matt at openssl.org Thu Dec 3 19:03:57 2015 From: matt at openssl.org (Matt Caswell) Date: Thu, 3 Dec 2015 19:03:57 +0000 Subject: [openssl-announce] OpenSSL version 0.9.8zh released (corrected download) Message-ID: <5660921D.2000303@openssl.org> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Due to an error in the release process the original distribution downloads were failing to build. New downloads have now been made available on the website. Corrected checksums are given below. OpenSSL version 0.9.8zh released =============================== OpenSSL - The Open Source toolkit for SSL/TLS http://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 0.9.8zh of our open source toolkit for SSL/TLS. For details of changes and known issues see the release notes at: http://www.openssl.org/news/openssl-0.9.8-notes.html OpenSSL 0.9.8zh is available for download via HTTP and FTP from the following master locations (you can find the various FTP mirrors under http://www.openssl.org/source/mirror.html): * http://www.openssl.org/source/ * ftp://ftp.openssl.org/source/ The distribution file name is: o openssl-0.9.8zh.tar.gz Size: 3818524 MD5 checksum: c813c065dd53d7bd0a560a870ddd0af5 SHA1 checksum: 3ff71636bea85a99f4d76a10d119c09bda0421e3 SHA256 checksum: f1d9f3ed1b85a82ecf80d0e2d389e1fda3fca9a4dba0bf07adbf231e1a5e2fd6 The checksums were calculated using the following commands: openssl md5 openssl-0.9.8zh.tar.gz openssl sha1 openssl-0.9.8zh.tar.gz openssl sha256 openssl-0.9.8zh.tar.gz Yours, The OpenSSL Project Team. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQEcBAEBCAAGBQJWYJIdAAoJENnE0m0OYESR2LoH/j+PPvqiLnh1AgcXMFXlJ+2L 1GxJXVhUVW/d6ws6P1u0ogvX8/W6VCtiWHEcP08zhzQKoQNrga6EvxYlSNQgE80s z+GTC1fI2F8gnz9my1s4IowKQOCumSUKU39YhhZ+JpicbThj3tTE3eC07mnJtHYK bCl3Ec6Q4K5HRq7KxHRFLPwD7Mt3gJ4SCMLgRLT/Q/kbHdV20luMFqS6YsI0tdpB mPBZYeNrU0n8OtRS4aXu8O0+iYHN6xsnaLhGNGVtqkbb9cy3GFcU7clP990D67Td R6XHEae4hA0gxsI91/ARfkRsbwr3HToOmjqasmYWdzS9YfULtyXCvHGwPYJv8O8= =ps/C -----END PGP SIGNATURE----- From openssl at openssl.org Fri Dec 4 14:41:32 2015 From: openssl at openssl.org (OpenSSL) Date: Fri, 4 Dec 2015 14:41:32 +0000 Subject: [openssl-announce] Updated OpenSSL Security Advisory Message-ID: <20151204144132.GA16102@openssl.org> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 OpenSSL Security Advisory [3 Dec 2015] - Updated [4 Dec 2015] ============================================================= [Updated 4 Dec 2015]: This advisory has been updated to include the details of CVE-2015-1794, a Low severity issue affecting OpenSSL 1.0.2 which had a fix included in the released packages but was missed from the advisory text. NOTE: WE ANTICIPATE THAT 1.0.0t AND 0.9.8zh WILL BE THE LAST RELEASES FOR THE 0.9.8 AND 1.0.0 VERSIONS AND THAT NO MORE SECURITY FIXES WILL BE PROVIDED (AS PER PREVIOUS ANNOUNCEMENTS). USERS ARE ADVISED TO UPGRADE TO LATER VERSIONS. BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193) ================================================================== Severity: Moderate There is a carry propagating bug in the x86_64 Montgomery squaring procedure. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. This issue affects OpenSSL version 1.0.2. OpenSSL 1.0.2 users should upgrade to 1.0.2e This issue was reported to OpenSSL on August 13 2015 by Hanno B??ck. The fix was developed by Andy Polyakov of the OpenSSL development team. Certificate verify crash with missing PSS parameter (CVE-2015-3194) =================================================================== Severity: Moderate The signature verification routines will crash with a NULL pointer dereference if presented with an ASN.1 signature using the RSA PSS algorithm and absent mask generation function parameter. Since these routines are used to verify certificate signature algorithms this can be used to crash any certificate verification operation and exploited in a DoS attack. Any application which performs certificate verification is vulnerable including OpenSSL clients and servers which enable client authentication. This issue affects OpenSSL versions 1.0.2 and 1.0.1. OpenSSL 1.0.2 users should upgrade to 1.0.2e OpenSSL 1.0.1 users should upgrade to 1.0.1q This issue was reported to OpenSSL on August 27 2015 by Lo??c Jonas Etienne (Qnective AG). The fix was developed by Dr. Stephen Henson of the OpenSSL development team. X509_ATTRIBUTE memory leak (CVE-2015-3195) ========================================== Severity: Moderate When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak memory. This structure is used by the PKCS#7 and CMS routines so any application which reads PKCS#7 or CMS data from untrusted sources is affected. SSL/TLS is not affected. This issue affects OpenSSL versions 1.0.2 and 1.0.1, 1.0.0 and 0.9.8. OpenSSL 1.0.2 users should upgrade to 1.0.2e OpenSSL 1.0.1 users should upgrade to 1.0.1q OpenSSL 1.0.0 users should upgrade to 1.0.0t OpenSSL 0.9.8 users should upgrade to 0.9.8zh This issue was reported to OpenSSL on November 9 2015 by Adam Langley (Google/BoringSSL) using libFuzzer. The fix was developed by Dr. Stephen Henson of the OpenSSL development team. Race condition handling PSK identify hint (CVE-2015-3196) ========================================================= Severity: Low If PSK identity hints are received by a multi-threaded client then the values are wrongly updated in the parent SSL_CTX structure. This can result in a race condition potentially leading to a double free of the identify hint data. This issue was fixed in OpenSSL 1.0.2d and 1.0.1p but has not been previously listed in an OpenSSL security advisory. This issue also affects OpenSSL 1.0.0 and has not been previously fixed in an OpenSSL 1.0.0 release. OpenSSL 1.0.2 users should upgrade to 1.0.2d OpenSSL 1.0.1 users should upgrade to 1.0.1p OpenSSL 1.0.0 users should upgrade to 1.0.0t The fix for this issue can be identified in the OpenSSL git repository by commit ids 3c66a669dfc7 (1.0.2), d6be3124f228 (1.0.1) and 1392c238657e (1.0.0). The fix was developed by Dr. Stephen Henson of the OpenSSL development team. Anon DH ServerKeyExchange with 0 p parameter (CVE-2015-1794) ============================================================ Severity: Low If a client receives a ServerKeyExchange for an anonymous DH ciphersuite with the value of p set to 0 then a seg fault can occur leading to a possible denial of service attack. This issue affects OpenSSL version 1.0.2. OpenSSL 1.0.2 users should upgrade to 1.0.2e This issue was reported to OpenSSL on August 3 2015 by Guy Leaver (Cisco). The fix was developed by Matt Caswell of the OpenSSL development team. Note ==== As per our previous announcements and our Release Strategy (https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions 1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these versions will be provided after that date. In the absence of significant security issues being identified prior to that date, the 1.0.0t and 0.9.8zh releases will be the last for those versions. Users of these versions are advised to upgrade. References ========== URL for this Security Advisory: https://www.openssl.org/news/secadv/20151203.txt Note: the online version of the advisory may be updated with additional details over time. For details of OpenSSL severity classifications please see: https://www.openssl.org/about/secpolicy.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJWYaMQAAoJENnE0m0OYESRvMAIAKkGjtOTKeqpUuWvzCVs8VV/ lHWZ7ZKZMI3LQHLX0lOTu8Ypipth83eHPDQxEzhkjzjGPsVrEZ+2Labm/awTKr7H UhrvFEl0R1hag/ssvyXWOaQ+ZyHITzeSHVcOu35tf9cSrHf6JMYOwV1H2JDyAoX/ 7Spwxj/scmH2VS9Xz9sIzV5FTxZV1V0QrerU67gjp7ZYiUMW+4nvCGsEk6fOW52G R06XjV4HyDP9TbAVYexu8uqpBLPavWT+zGxDlMZzyY41OptDHcHwPRfI/pgPdA2g m9oVmxGRAi6MMz/uOAXaUC5dPFSqt9iJATIrFALpXsY4OjebpqFucN/qyT0KDco= =VWCg -----END PGP SIGNATURE----- From openssl at openssl.org Thu Dec 10 15:01:50 2015 From: openssl at openssl.org (OpenSSL) Date: Thu, 10 Dec 2015 15:01:50 +0000 Subject: [openssl-announce] OpenSSL version 1.1.0 pre release 1 published Message-ID: <20151210150150.GA30915@openssl.org> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 OpenSSL version 1.1.0 pre release 1 (alpha) =========================================== OpenSSL - The Open Source toolkit for SSL/TLS http://www.openssl.org/ OpenSSL 1.1.0 is currently in alpha. OpenSSL 1.1.0 pre release 1 has now been made available. For details of changes and known issues see the release notes at: http://www.openssl.org/news/openssl-1.1.0-notes.html Note: This OpenSSL pre-release has been provided for testing ONLY. It should NOT be used for security critical purposes. The alpha release is available for download via HTTP and FTP from the following master locations (you can find the various FTP mirrors under http://www.openssl.org/source/mirror.html): * http://www.openssl.org/source/ * ftp://ftp.openssl.org/source/ The distribution file name is: o openssl-1.1.0-pre1.tar.gz Size: 4990889 SHA1 checksum: a058b999e17e0c40988bd7b9b280c9876f62684e SHA256 checksum: 79da49c38464a19d1b328c2f4a3661849bd2eb3d54a37fdb6a56d9b8a18e87bd The checksums were calculated using the following commands: openssl sha1 openssl-1.1.0-pre1.tar.gz openssl sha256 openssl-1.1.0-pre1.tar.gz Please download and check this alpha release as soon as possible. Bug reports should go to rt at openssl.org. Please check the release notes and mailing lists to avoid duplicate reports of known issues. Yours, The OpenSSL Project Team. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJWaYrRAAoJENnE0m0OYESRh5gIAJ8WrkPPV8CW2xWmtyIjAxpz 7FvvpxBWHaBgJcCrvNomh2JJupXa+enWCTsskIyH0+FtS85VeOKNvQg68xbCOvLl I0dWxMNb8SCxuagvEje8xGEnf8by8pZdYaK8ERASlNoGVIgN8CwppiKnY8c1yRYn Ti0dUZLyVZvT5Qm2Q3k4pOvfS/+rvFjHiuUllFzfHlp6mdk4573w5eneoTINQvRK OC8iAnSiINQWQvuiavLVIgw7VFBD1WC2iKWuSA3+31YuM8CUpvbbnJHh2QUfGkIw oNTkflxgQJhk/txwqvCSzZsVddhvQLZtiRZYQcG4WUuskygCENeieJGPOXN6ioI= =LY4X -----END PGP SIGNATURE-----