Accepting request 882114 from home:jsikes:branches:security:tls

Update to 1.1.1k with CVE fixes. Enjoy!

OBS-URL: https://build.opensuse.org/request/show/882114
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=90
This commit is contained in:
Jason Sikes 2021-03-30 07:22:25 +00:00 committed by Git OBS Bridge
parent 2a418dd2f6
commit abf147163e

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Thu Mar 25 23:51:47 UTC 2021 - Jason Sikes <jsikes@suse.com>
- Update to 1.1.1k
* Fixed a problem with verifying a certificate chain when using
the X509_V_FLAG_X509_STRICT flag. This flag enables additional
security checks of the certificates present in a certificate
chain. It is not set by default. ([CVE-2021-3450])
* Fixed an issue where an OpenSSL TLS server may crash if sent a
maliciously crafted renegotiation ClientHello message from a
client. If a TLSv1.2 renegotiation ClientHello omits the
signature_algorithms extension (where it was present in the
initial ClientHello), but includes a signature_algorithms_cert
extension then a NULL pointer dereference will result, leading
to a crash and a denial of service attack.
A server is only vulnerable if it has TLSv1.2 and renegotiation
enabled (which is the default configuration). OpenSSL TLS
clients are not impacted by this issue. ([CVE-2021-3449])
------------------------------------------------------------------- -------------------------------------------------------------------
Tue Mar 2 19:40:25 UTC 2021 - Pedro Monreal <pmonreal@suse.com> Tue Mar 2 19:40:25 UTC 2021 - Pedro Monreal <pmonreal@suse.com>