[Bug 1987047] Re: openssl: merge 3.0.5-2 from Debian unstable
Launchpad Bug Tracker
1987047 at bugs.launchpad.net
Mon Aug 22 19:38:30 UTC 2022
This bug was fixed in the package openssl - 3.0.5-2ubuntu1
---------------
openssl (3.0.5-2ubuntu1) kinetic; urgency=low
* Merge from Debian unstable (LP: #1987047). Remaining changes:
- Replace duplicate files in the doc directory with symlinks.
- d/libssl3.postinst: Revert Debian deletion
+ Skip services restart & reboot notification if needrestart is in-use.
+ Bump version check to to 1.1.1.
+ Use a different priority for libssl1.1/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
+ Import libraries/restart-without-asking template as used by above.
- Add support for building with noudeb build profile.
- Revert "Enable system default config to enforce TLS1.2 as a
minimum" & "Increase default security level from 1 to 2".
- Set OPENSSL_TLS_SECURITY_LEVEL=2 as compiled-in minimum security
level. Change meaning of SECURITY_LEVEL=2 to prohibit TLS versions
below 1.2 and update documentation. Previous default of 1, can be set
by calling SSL_CTX_set_security_level(), SSL_set_security_level() or
using ':@SECLEVEL=1' CipherString value in openssl.cfg.
- Use perl:native in the autopkgtest for installability on i386.
- d/p/skip_tls1.1_seclevel3_tests.patch: new Ubuntu-specific patch for the
testsuite
- d/p/Set-systemwide-default-settings-for-libssl-users: partially apply it
on Ubuntu to make it easier for user to change security level
* Dropped changes, merged upstream:
- d/p/fix-avx512-overflow.patch: Cherry-picked from upstream to fix a 3.0.4
regression on AVX-512 capable CPUs.
* Revert the provider removal from the default configuration, following
discussions on LP: #1979639
openssl (3.0.5-2) unstable; urgency=medium
* Update to commit ce3951fc30c7b ("VC++ 2008 or earlier x86 compilers…")
(Closes: #1016290).
openssl (3.0.5-1) unstable; urgency=medium
* Import 3.0.5
- Possible module_list_lock crash (Closes: #1013309).
- CVE-2022-2097 (AES OCB fails to encrypt some bytes).
* Update to 55461bf22a57a ("Don't try to make configuration leaner")
* Use -latomic on arc,nios2 and sparc (Closes: #1015792).
openssl (3.0.4-2) unstable; urgency=medium
* Address a AVX2 related memory corruption (Closes: #1013441)
(CVE-2022-2274).
-- Simon Chopin <schopin at ubuntu.com> Fri, 19 Aug 2022 10:05:04 +0200
** Changed in: openssl (Ubuntu)
Status: In Progress => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-2097
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-2274
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1987047
Title:
openssl: merge 3.0.5-2 from Debian unstable
Status in openssl package in Ubuntu:
Fix Released
Bug description:
We need to merge the new version from Debian, notably because of
CVE-2022-2097 (the other security issue already being fixed as a
cherry-picked patch)
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1987047/+subscriptions
More information about the foundations-bugs
mailing list