Change History (5)
comment:1 by , 5 years ago
comment:2 by , 5 years ago
Modified and committed into svn:
http://svn.linuxfromscratch.org/patches/trunk/openssl/openssl-1.1.1d-upstream_fix-1.patch
comment:3 by , 5 years ago
Priority: | normal → high |
---|
Major changes between OpenSSL 1.1.1c and OpenSSL 1.1.1d [10 Sep 2019]
- Fixed a fork protection issue (CVE-2019-1549)
- LFS Note: Base Score: 5.3 MEDIUM; Impact Score: 1.4; Exploitability Score: 3.9
- Fixed a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey
(CVE-2019-1563)
- Base Score: 3.7 LOW; Impact Score: 1.4; Exploitability Score: 2.2
- For built-in EC curves, ensure an EC_GROUP built from the curve name is used even when parsing explicit parameters
- Compute ECC cofactors if not provided during EC_GROUP construction
(CVE-2019-1547)
- Base Score: 4.7 MEDIUM; Impact Score: 3.6; Exploitability Score: 1.0
- Early start up entropy quality from the DEVRANDOM seed source has been improved for older Linux systems
- Correct the extended master secret constant on EBCDIC systems
- Use Windows installation paths in the mingw builds (CVE-2019-1552)
- LFS N/A
- Changed DH_check to accept parameters with order q and 2q subgroups
- Significantly reduce secure memory usage by the randomness pools
- Revert the DEVRANDOM_WAIT feature for Linux systems
comment:5 by , 5 years ago
On my BLFS system 20-test_enc.t
fails while I'm using a normal user. And this issue has been reported and fixed upstream:
https://github.com/openssl/openssl/issues/9866
Can someone reconfirm or disconfirm it?
Note:
See TracTickets
for help on using tickets.
We need a patch:
https://github.com/openssl/openssl/pull/9876.patch