Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update conanfile.txt #1753

Closed
wants to merge 1 commit into from
Closed

Update conanfile.txt #1753

wants to merge 1 commit into from

Conversation

mosfet80
Copy link
Contributor

@mosfet80 mosfet80 commented Jul 6, 2023

Mitigate for very slow OBJ_obj2txt() performance with gigantic OBJECT IDENTIFIER sub-identities. (CVE-2023-2650) Fixed documentation of X509_VERIFY_PARAM_add0_policy() (CVE-2023-0466) Fixed handling of invalid certificate policies in leaf certificates (CVE-2023-0465) Limited the number of nodes created in a policy tree ([CVE-2023-0464]) Major changes between OpenSSL 1.1.1s and OpenSSL 1.1.1t [7 Feb 2023] Fixed X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) Fixed Use-after-free following BIO_new_NDEF (CVE-2023-0215) Fixed Double free after calling PEM_read_bio_ex (CVE-2022-4450) Fixed Timing Oracle in RSA Decryption (CVE-2022-4304) Major changes between OpenSSL 1.1.1r and OpenSSL 1.1.1s [1 Nov 2022] Fixed a regression introduced in OpenSSL 1.1.1r not refreshing the certificate data to be signed before signing the certificate. Major changes between OpenSSL 1.1.1q and OpenSSL 1.1.1r [11 Oct 2022] Added a missing header for memcmp that caused compilation failure on some platforms Major changes between OpenSSL 1.1.1p and OpenSSL 1.1.1q [5 Jul 2022] Fixed AES OCB failure to encrypt some bytes on 32-bit x86 platforms (CVE-2022-2097) Major changes between OpenSSL 1.1.1o and OpenSSL 1.1.1p [21 Jun 2022] Fixed additional bugs in the c_rehash script which was not properly sanitising shell metacharacters to prevent command injection (CVE-2022-2068) Major changes between OpenSSL 1.1.1n and OpenSSL 1.1.1o [3 May 2022] Fixed a bug in the c_rehash script which was not properly sanitising shell metacharacters to prevent command injection (CVE-2022-1292) Major changes between OpenSSL 1.1.1m and OpenSSL 1.1.1n [15 Mar 2022] Fixed a bug in the BN_mod_sqrt() function that can cause it to loop forever for non-prime moduli (CVE-2022-0778) Major changes between OpenSSL 1.1.1l and OpenSSL 1.1.1m [14 Dec 2021] None
Major changes between OpenSSL 1.1.1k and OpenSSL 1.1.1l [24 Aug 2021] Fixed an SM2 Decryption Buffer Overflow (CVE-2021-3711) Fixed various read buffer overruns processing ASN.1 strings (CVE-2021-3712) Major changes between OpenSSL 1.1.1j and OpenSSL 1.1.1k [25 Mar 2021] Fixed a problem with verifying a certificate chain when using the X509_V_FLAG_X509_STRICT flag (CVE-2021-3450) Fixed an issue where an OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client (CVE-2021-3449)

Mitigate for very slow `OBJ_obj2txt()` performance with gigantic OBJECT IDENTIFIER sub-identities. (CVE-2023-2650)
Fixed documentation of X509_VERIFY_PARAM_add0_policy() (CVE-2023-0466)
Fixed handling of invalid certificate policies in leaf certificates (CVE-2023-0465)
Limited the number of nodes created in a policy tree ([CVE-2023-0464])
Major changes between OpenSSL 1.1.1s and OpenSSL 1.1.1t [7 Feb 2023]
Fixed X.400 address type confusion in X.509 GeneralName (CVE-2023-0286)
Fixed Use-after-free following BIO_new_NDEF (CVE-2023-0215)
Fixed Double free after calling PEM_read_bio_ex (CVE-2022-4450)
Fixed Timing Oracle in RSA Decryption (CVE-2022-4304)
Major changes between OpenSSL 1.1.1r and OpenSSL 1.1.1s [1 Nov 2022]
Fixed a regression introduced in OpenSSL 1.1.1r not refreshing the certificate data to be signed before signing the certificate.
Major changes between OpenSSL 1.1.1q and OpenSSL 1.1.1r [11 Oct 2022]
Added a missing header for memcmp that caused compilation failure on some platforms
Major changes between OpenSSL 1.1.1p and OpenSSL 1.1.1q [5 Jul 2022]
Fixed AES OCB failure to encrypt some bytes on 32-bit x86 platforms (CVE-2022-2097)
Major changes between OpenSSL 1.1.1o and OpenSSL 1.1.1p [21 Jun 2022]
Fixed additional bugs in the c_rehash script which was not properly sanitising shell metacharacters to prevent command injection (CVE-2022-2068)
Major changes between OpenSSL 1.1.1n and OpenSSL 1.1.1o [3 May 2022]
Fixed a bug in the c_rehash script which was not properly sanitising shell metacharacters to prevent command injection (CVE-2022-1292)
Major changes between OpenSSL 1.1.1m and OpenSSL 1.1.1n [15 Mar 2022]
Fixed a bug in the BN_mod_sqrt() function that can cause it to loop forever for non-prime moduli (CVE-2022-0778)
Major changes between OpenSSL 1.1.1l and OpenSSL 1.1.1m [14 Dec 2021]
None
Major changes between OpenSSL 1.1.1k and OpenSSL 1.1.1l [24 Aug 2021]
Fixed an SM2 Decryption Buffer Overflow (CVE-2021-3711)
Fixed various read buffer overruns processing ASN.1 strings (CVE-2021-3712)
Major changes between OpenSSL 1.1.1j and OpenSSL 1.1.1k [25 Mar 2021]
Fixed a problem with verifying a certificate chain when using the X509_V_FLAG_X509_STRICT flag (CVE-2021-3450)
Fixed an issue where an OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client (CVE-2021-3449)
Copy link
Contributor

@eboasson eboasson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I always forget that people may be using this for builds that are used outside the isolated environment that is the CI. Thanks for updating it!

@eboasson
Copy link
Contributor

eboasson commented Jul 6, 2023

I do need to ask you to please fill out the Eclipse Contributor Agreement, because without an ECA on file I am not allowed to merge this PR.

The automated check (eclipsefdn/eca) doesn't re-run automatically after you sign it, but I can trigger it if you let me know.

@mosfet80
Copy link
Contributor Author

I'm signed into eclipse.org

@eboasson
Copy link
Contributor

Thanks for signing the ECA. You may have wondered why nothing happened, but it is simply that in between reviewing this PR and your signing the ECA, I started seeing CI failures because of a Conan + CUnit problem on my own fork. It was only a matter of time until the main repository CI would go down, too: the only reason it was still operating was caching of Conan ... In short, I was particularly afraid that merging this PR would trigger that meltdown.

#1767 eliminates the use of Conan and CUnit. So that particular risk is gone. It also means that this PR is now superfluous.

@eboasson eboasson closed this Jul 18, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants