[SRU] OpenSSL 1.1.1 to 18.04 LTS
Affects | Status | Importance | Assigned to | Milestone | ||
---|---|---|---|---|---|---|
libio-socket-ssl-perl (Ubuntu) | ||||||
Bionic |
Fix Released
|
Undecided
|
Unassigned | |||
libnet-ssleay-perl (Ubuntu) | ||||||
Bionic |
Fix Released
|
Undecided
|
Unassigned | |||
libwww-perl (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | |||
Bionic |
Fix Released
|
Undecided
|
Unassigned | |||
openssl (Ubuntu) |
Fix Released
|
Undecided
|
Steve Langasek | |||
Bionic |
Fix Released
|
Undecided
|
Unassigned | |||
python-cryptography (Ubuntu) | ||||||
Bionic |
Fix Released
|
Undecided
|
Unassigned | |||
python-tornado (Ubuntu) | ||||||
Bionic |
Fix Released
|
Undecided
|
Unassigned | |||
python2.7 (Ubuntu) | ||||||
Bionic |
Fix Released
|
Undecided
|
Unassigned | |||
python3.6 (Ubuntu) | ||||||
Bionic |
Fix Released
|
Undecided
|
Unassigned | |||
python3.7 (Ubuntu) | ||||||
Bionic |
Fix Released
|
Undecided
|
Unassigned | |||
r-cran-openssl (Ubuntu) | ||||||
Bionic |
Fix Released
|
Undecided
|
Unassigned | |||
ruby-openssl (Ubuntu) | ||||||
Bionic |
Fix Released
|
Undecided
|
Unassigned | |||
ruby2.5 (Ubuntu) | ||||||
Bionic |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
[Impact]
* OpenSSL 1.1.1 is an LTS release upstream, which will continue to receive security support for much longer than 1.1.0 series will.
* OpenSSL 1.1.1 comes with support for TLS v1.3 which is expected to be rapidly adopted due to increased set of supported hashes & algoes, as well as improved handshake [re-]negotiation.
* OpenSSL 1.1.1 comes with improved hw-acceleration capabilities.
* OpenSSL 1.1.1 is ABI/API compatible with 1.1.0, however some software is sensitive to the negotiation handshake and may either need patches/
[Test Case]
* Rebuild all reverse dependencies
* Execute autopkg tests for all of them
* Clamp down to TLS v1.2 software that does not support TLS v1.3 (e.g. mongodb)
* Backport TLS v1.3 support patches, where applicable
[Test cases for the python updates]
python3.7 is a preview in bionic as a non-supported/
version of python3. Passing it's own autopkgtests is sufficient
validation for python3.7. It includes a point release update, with
OpenSSL 1.1.1 compat and features.
python3.6 not only has OpenSSL 1.1.1 compat and features patches, but
also includes a point release update to 3.6.8. It has been part of the
full-archive rebuild and regression analysis. Autopkgtests were
triggered for python3.6 and python3-defaults with regressions already
fixed in the individual packages as appropriate.
python2.7 has the update from .15~rc1 to .15 final, with OpenSSL 1.1.1
compat only. It has been part of the full-archive rebuild and
regression analysis. Autopkgtests were triggered for python2.7 and
python-defaults with regressions already fixed in the individual
packages as appropriate.
The archive rebuilds done, were commulative with OpenJDK 11, OpenSSL 1.1.1 and python point releases as seen in:
http://
http://
And analyzed in
https:/
[ Test case libwww-perl (and deps) regression ]
https:/
1. apt install liblwp-
2. enable -proposed
3. apt install libio-socket-
4. perl -MLWP::UserAgent -e 'LWP::UserAgent
[Regression Potential]
* Connectivity interop is the biggest issues which will be unavoidable with introducing TLS v1.3. However, tests on cosmic demonstrate that curl/nginx/
* Mitigation of discovered connectivity issues will be possible by clamping down to TLS v1.2 in either server-side or client-side software or by backporting relevant support fixes
* Notable changes are listed here https:/
* Most common connectivity issues so far:
- client verifies SNI in TLSv1.3 mode, yet client doesn't set hostname. Solution is client change to set hostname, or to clamp down the client to TLSv1.2.
- session negotiation is different in TLSv1.3, existing client code may fail to create/
- non-application data records. TLSv1.3 sends more of these, when compared with previous versions, and some applications may not handle this correctly. Resulting in application data not being available, when previously expected. Mitigation around these involve disabling/enabling SSL_MODE_AUTO_RETRY or setting max protocol version to TLSv1.2. For example see discussion identified in the perl stack https:/
Similar hangs are possible with prior versions of TLS as well, it is however easier to trigger this with TLSv1.3.
* Deprecated npn extenstion does not exist in TLSv1.3 implementation.
* This update bundles python 3.6 and 3.7 point releases
* libnet-ssleay-perl introduces two API changes which carry some risk of regression to consuming applications. The risk is considered small.
- Servers implemented in perl may now raise SIGPIPE in the event of a premature client disconnection. This may be a behavior change in openssl itself but has only been noticed in the libnet-ssleay-perl tests. This may represent a DoS attack against any third-party TLS-using servers implemented in perl if they do not already handle SIGPIPE gracefully.
- The behavior of SSLeay::read() and SSLeay::write() has been changed to NOT retry on short reads/short writes, leading to the perl API more closely matching the C API. There are new ssl_read_all() / ssl_write_all() calls for applications which want the previous behavior.
[Test case, python-tornado]
This is a test-only fix to fix build-time tests and autopkgtests that have regressed as a result of the openssl update. The test case is that the package builds and passes its autopkgtests again.
[Other Info]
* Previous FFe for OpenSSL in 18.10 is at
https:/
* TLS v1.3 support in NSS is expected to make it to 18.04 via security updates
* TLS v1.3 support in GnuTLS is expected to be available in 19.04
* Test OpenSSL is being prepared in
https:/
[Autopkgtest Regressions]
dovecot/armhf - flakey
libnet-ssleay-perl - awaiting sru accept into proposed of
libnet-ssleay-perl and libio-socket-
versioned breaks.
linux* - rebuild testcases passes (for some edge flavours the build
fails in non-ssl portions of the build), ubuntu-
testcase fails for a few variants but should have been skipped (in
progress to be fixed in
https:/
openvswitch/i386 - extremely flakey, errors out or fails mostly
CVE References
tags: | added: bionic |
summary: |
- SRU OpenSSL 1.1.1 to 18.04 LTS + [SRU] OpenSSL 1.1.1 to 18.04 LTS |
description: | updated |
description: | updated |
description: | updated |
Changed in openssl (Ubuntu): | |
status: | Confirmed → In Progress |
description: | updated |
Changed in openssl (Ubuntu Bionic): | |
status: | Incomplete → Confirmed |
Changed in openssl (Ubuntu): | |
assignee: | nobody → Steve Langasek (vorlon) |
description: | updated |
description: | updated |
no longer affects: | salt (Ubuntu) |
no longer affects: | salt (Ubuntu Bionic) |
description: | updated |
Changed in openssl (Ubuntu): | |
status: | In Progress → Fix Released |
information type: | Public → Public Security |
information type: | Public Security → Public |
description: | updated |
Changed in python-tornado (Ubuntu): | |
status: | Confirmed → In Progress |
description: | updated |
Changed in libnet-ssleay-perl (Ubuntu Bionic): | |
status: | Incomplete → In Progress |
Changed in libio-socket-ssl-perl (Ubuntu Bionic): | |
status: | Incomplete → In Progress |
Changed in libwww-perl (Ubuntu): | |
status: | Incomplete → In Progress |
description: | updated |
no longer affects: | python-tornado (Ubuntu) |
tags: | added: bionic-openssl-1.1 |
Status changed to 'Confirmed' because the bug affects multiple users.