[Bug 1940656] Re: Potential use after free bugs in 1.1.1

2021-11-15 Thread Launchpad Bug Tracker
This bug was fixed in the package openssl - 1.1.1f-1ubuntu2.9 --- openssl (1.1.1f-1ubuntu2.9) focal; urgency=medium * Cherry-pick stable patches to fix potential use-after-free. LP: #1940656 -- Dimitri John Ledkov Wed, 25 Aug 2021 02:13:44 +0100 ** Changed in: openssl (Ubun

[Bug 1940656] Re: Potential use after free bugs in 1.1.1

2021-11-12 Thread Dimitri John Ledkov
** Tags removed: verification-needed verification-needed-focal ** Tags added: verification-done verification-done-focal -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1940656 Title: Potential use aft

[Bug 1940656] Re: Potential use after free bugs in 1.1.1

2021-11-12 Thread Dimitri John Ledkov
I currently do not have a more regular smartcard setup to test out a hardware pk11 engine with openssl, which is typically the most common one. But I can use software gost engine to test out that algos provided by the engine operate correctly. Installed openssl from proposed, and gost engine. $ d

[Bug 1940656] Re: Potential use after free bugs in 1.1.1

2021-11-11 Thread Brian Murray
@xnox Could you finish the verification and tag the bug verification- done? " * Configure and use openssl with any engine and ensure that it continues to work" -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net

[Bug 1940656] Re: Potential use after free bugs in 1.1.1

2021-11-11 Thread Dimitri John Ledkov
There is now only a transient ADT regression in Regression in linux- hwe-5.13 (armhf), which is not a valid ADT because armhf ADT runs in lxd containers and does not boot the requested kernel. Please release this package. -- You received this bug notification because you are a member of Ubuntu B

[Bug 1940656] Re: Potential use after free bugs in 1.1.1

2021-10-31 Thread Mathew Hodson
** Changed in: openssl (Ubuntu) Importance: Undecided => Medium ** Changed in: openssl (Ubuntu Focal) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1940656 Title

[Bug 1940656] Re: Potential use after free bugs in 1.1.1

2021-09-17 Thread Steve Langasek
Hello Dimitri, or anyone else affected, Accepted openssl into focal-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/openssl/1.1.1f-1ubuntu2.9 in a few hours, and then in the -proposed repository. Please help us by testing this new package. See https:

[Bug 1940656] Re: Potential use after free bugs in 1.1.1

2021-09-14 Thread Robie Basak
Thanks Marc and Dimitri! With Marc's confirmation this is unblocked from the SRU queue then. But please don't assign me. Any member of the SRU team can process this. Assigning individual SRU team members not part of the SRU process, implies an implied lock that isn't there, and would only delay th

[Bug 1940656] Re: Potential use after free bugs in 1.1.1

2021-09-14 Thread Marc Deslauriers
I'd rather these go through the SRU process first, and they will get picked up automatically next time we do an openssl security update. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1940656 Title:

[Bug 1940656] Re: Potential use after free bugs in 1.1.1

2021-09-14 Thread Dimitri John Ledkov
** Changed in: openssl (Ubuntu Focal) Status: Incomplete => In Progress ** Changed in: openssl (Ubuntu Focal) Assignee: (unassigned) => Robie Basak (racb) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launch

[Bug 1940656] Re: Potential use after free bugs in 1.1.1

2021-09-14 Thread Dimitri John Ledkov
I would agree that any hypothetical use-after-free / double-free errors are usually also security vulnerabilities. But these ones were discovered with static analysis and/or affecting engine use, in error conditions only. Thus connectivity must already be failing / denied, before one can trip these

[Bug 1940656] Re: Potential use after free bugs in 1.1.1

2021-09-01 Thread Robie Basak
Shouldn't these go into the security pocket? At the least I'd like an explicit nak from the security team please. ** Changed in: openssl (Ubuntu Focal) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. h

[Bug 1940656] Re: Potential use after free bugs in 1.1.1

2021-08-20 Thread Dimitri John Ledkov
** Patch added: "lp-1940656-3-engine-fix-double-free-on-error-path.patch" https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1940656/+attachment/5519403/+files/lp-1940656-3-engine-fix-double-free-on-error-path.patch -- You received this bug notification because you are a member of Ubuntu

[Bug 1940656] Re: Potential use after free bugs in 1.1.1

2021-08-20 Thread Dimitri John Ledkov
** Patch added: "lp-1940656-1-srp-fix-double-free.patch" https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1940656/+attachment/5519401/+files/lp-1940656-1-srp-fix-double-free.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubunt

[Bug 1940656] Re: Potential use after free bugs in 1.1.1

2021-08-20 Thread Dimitri John Ledkov
** Patch added: "lp-1940656-4-Prevent-use-after-free-of-global_engine_lock.patch" https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1940656/+attachment/5519404/+files/lp-1940656-4-Prevent-use-after-free-of-global_engine_lock.patch -- You received this bug notification because you are a

[Bug 1940656] Re: Potential use after free bugs in 1.1.1

2021-08-20 Thread Dimitri John Ledkov
** Patch added: "lp-1940656-2-ts-fix-double-free-on-error-path.patch" https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1940656/+attachment/5519402/+files/lp-1940656-2-ts-fix-double-free-on-error-path.patch -- You received this bug notification because you are a member of Ubuntu Bugs, wh