deps: upgrade openssl sources to 1.1.1k+quic · nodejs/node@bbdcdad

@@ -7,6 +7,50 @@

77

https://github.com/openssl/openssl/commits/ and pick the appropriate

88

release branch.

9910+

Changes between 1.1.1j and 1.1.1k [25 Mar 2021]

11+12+

*) Fixed a problem with verifying a certificate chain when using the

13+

X509_V_FLAG_X509_STRICT flag. This flag enables additional security checks

14+

of the certificates present in a certificate chain. It is not set by

15+

default.

16+17+

Starting from OpenSSL version 1.1.1h a check to disallow certificates in

18+

the chain that have explicitly encoded elliptic curve parameters was added

19+

as an additional strict check.

20+21+

An error in the implementation of this check meant that the result of a

22+

previous check to confirm that certificates in the chain are valid CA

23+

certificates was overwritten. This effectively bypasses the check

24+

that non-CA certificates must not be able to issue other certificates.

25+26+

If a "purpose" has been configured then there is a subsequent opportunity

27+

for checks that the certificate is a valid CA. All of the named "purpose"

28+

values implemented in libcrypto perform this check. Therefore, where

29+

a purpose is set the certificate chain will still be rejected even when the

30+

strict flag has been used. A purpose is set by default in libssl client and

31+

server certificate verification routines, but it can be overridden or

32+

removed by an application.

33+34+

In order to be affected, an application must explicitly set the

35+

X509_V_FLAG_X509_STRICT verification flag and either not set a purpose

36+

for the certificate verification or, in the case of TLS client or server

37+

applications, override the default purpose.

38+

(CVE-2021-3450)

39+

[Tomáš Mráz]

40+41+

*) Fixed an issue where an OpenSSL TLS server may crash if sent a maliciously

42+

crafted renegotiation ClientHello message from a client. If a TLSv1.2

43+

renegotiation ClientHello omits the signature_algorithms extension (where

44+

it was present in the initial ClientHello), but includes a

45+

signature_algorithms_cert extension then a NULL pointer dereference will

46+

result, leading to a crash and a denial of service attack.

47+48+

A server is only vulnerable if it has TLSv1.2 and renegotiation enabled

49+

(which is the default configuration). OpenSSL TLS clients are not impacted

50+

by this issue.

51+

(CVE-2021-3449)

52+

[Peter Kästle and Samuel Sapalski]

53+1054

Changes between 1.1.1i and 1.1.1j [16 Feb 2021]

11551256

*) Fixed the X509_issuer_and_serial_hash() function. It attempts to