Added 1.0.1i CHANGES and NEWS updates
Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
This commit is contained in:
parent
0d6a11a91f
commit
5e60396fe7
88
CHANGES
88
CHANGES
@ -2,7 +2,7 @@
|
|||||||
OpenSSL CHANGES
|
OpenSSL CHANGES
|
||||||
_______________
|
_______________
|
||||||
|
|
||||||
Changes between 1.0.1h and 1.0.2 [xx XXX xxxx]
|
Changes between 1.0.1i and 1.0.2 [xx XXX xxxx]
|
||||||
|
|
||||||
*) Accelerated NIST P-256 elliptic curve implementation for x86_64
|
*) Accelerated NIST P-256 elliptic curve implementation for x86_64
|
||||||
(other platforms pending).
|
(other platforms pending).
|
||||||
@ -319,6 +319,92 @@
|
|||||||
X509_CINF_set_modified, X509_CINF_get_issuer, X509_CINF_get_extensions and
|
X509_CINF_set_modified, X509_CINF_get_issuer, X509_CINF_get_extensions and
|
||||||
X509_CINF_get_signature were reverted post internal team review.
|
X509_CINF_get_signature were reverted post internal team review.
|
||||||
|
|
||||||
|
Changes between 1.0.1h and 1.0.1i [6 Aug 2014]
|
||||||
|
|
||||||
|
*) Fix SRP buffer overrun vulnerability. Invalid parameters passed to the
|
||||||
|
SRP code can be overrun an internal buffer. Add sanity check that
|
||||||
|
g, A, B < N to SRP code.
|
||||||
|
|
||||||
|
Thanks to Sean Devlin and Watson Ladd of Cryptography Services, NCC
|
||||||
|
Group for discovering this issue.
|
||||||
|
(CVE-2014-3512)
|
||||||
|
[Steve Henson]
|
||||||
|
|
||||||
|
*) A flaw in the OpenSSL SSL/TLS server code causes the server to negotiate
|
||||||
|
TLS 1.0 instead of higher protocol versions when the ClientHello message
|
||||||
|
is badly fragmented. This allows a man-in-the-middle attacker to force a
|
||||||
|
downgrade to TLS 1.0 even if both the server and the client support a
|
||||||
|
higher protocol version, by modifying the client's TLS records.
|
||||||
|
|
||||||
|
Thanks to David Benjamin and Adam Langley (Google) for discovering and
|
||||||
|
researching this issue.
|
||||||
|
(CVE-2014-3511)
|
||||||
|
[David Benjamin]
|
||||||
|
|
||||||
|
*) OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject
|
||||||
|
to a denial of service attack. A malicious server can crash the client
|
||||||
|
with a null pointer dereference (read) by specifying an anonymous (EC)DH
|
||||||
|
ciphersuite and sending carefully crafted handshake messages.
|
||||||
|
|
||||||
|
Thanks to Felix Gröbert (Google) for discovering and researching this
|
||||||
|
issue.
|
||||||
|
(CVE-2014-3510)
|
||||||
|
[Emilia Käsper]
|
||||||
|
|
||||||
|
*) By sending carefully crafted DTLS packets an attacker could cause openssl
|
||||||
|
to leak memory. This can be exploited through a Denial of Service attack.
|
||||||
|
Thanks to Adam Langley for discovering and researching this issue.
|
||||||
|
(CVE-2014-3507)
|
||||||
|
[Adam Langley]
|
||||||
|
|
||||||
|
*) An attacker can force openssl to consume large amounts of memory whilst
|
||||||
|
processing DTLS handshake messages. This can be exploited through a
|
||||||
|
Denial of Service attack.
|
||||||
|
Thanks to Adam Langley for discovering and researching this issue.
|
||||||
|
(CVE-2014-3506)
|
||||||
|
[Adam Langley]
|
||||||
|
|
||||||
|
*) An attacker can force an error condition which causes openssl to crash
|
||||||
|
whilst processing DTLS packets due to memory being freed twice. This
|
||||||
|
can be exploited through a Denial of Service attack.
|
||||||
|
Thanks to Adam Langley and Wan-Teh Chang for discovering and researching
|
||||||
|
this issue.
|
||||||
|
(CVE-2014-3505)
|
||||||
|
[Adam Langley]
|
||||||
|
|
||||||
|
*) If a multithreaded client connects to a malicious server using a resumed
|
||||||
|
session and the server sends an ec point format extension it could write
|
||||||
|
up to 255 bytes to freed memory.
|
||||||
|
|
||||||
|
Thanks to Gabor Tyukasz (LogMeIn Inc) for discovering and researching this
|
||||||
|
issue.
|
||||||
|
(CVE-2014-3509)
|
||||||
|
[Gabor Tyukasz]
|
||||||
|
|
||||||
|
*) A malicious server can crash an OpenSSL client with a null pointer
|
||||||
|
dereference (read) by specifying an SRP ciphersuite even though it was not
|
||||||
|
properly negotiated with the client. This can be exploited through a
|
||||||
|
Denial of Service attack.
|
||||||
|
|
||||||
|
Thanks to Joonas Kuorilehto and Riku Hietamäki (Codenomicon) for
|
||||||
|
discovering and researching this issue.
|
||||||
|
(CVE-2014-5139)
|
||||||
|
[Steve Henson]
|
||||||
|
|
||||||
|
*) A flaw in OBJ_obj2txt may cause pretty printing functions such as
|
||||||
|
X509_name_oneline, X509_name_print_ex et al. to leak some information
|
||||||
|
from the stack. Applications may be affected if they echo pretty printing
|
||||||
|
output to the attacker.
|
||||||
|
|
||||||
|
Thanks to Ivan Fratric (Google) for discovering this issue.
|
||||||
|
(CVE-2014-3508)
|
||||||
|
[Emilia Käsper, and Steve Henson]
|
||||||
|
|
||||||
|
*) Fix ec_GFp_simple_points_make_affine (thus, EC_POINTs_mul etc.)
|
||||||
|
for corner cases. (Certain input points at infinity could lead to
|
||||||
|
bogus results, with non-infinity inputs mapped to infinity too.)
|
||||||
|
[Bodo Moeller]
|
||||||
|
|
||||||
Changes between 1.0.1g and 1.0.1h [5 Jun 2014]
|
Changes between 1.0.1g and 1.0.1h [5 Jun 2014]
|
||||||
|
|
||||||
*) Fix for SSL/TLS MITM flaw. An attacker using a carefully crafted
|
*) Fix for SSL/TLS MITM flaw. An attacker using a carefully crafted
|
||||||
|
14
NEWS
14
NEWS
@ -5,7 +5,7 @@
|
|||||||
This file gives a brief overview of the major changes between each OpenSSL
|
This file gives a brief overview of the major changes between each OpenSSL
|
||||||
release. For more details please read the CHANGES file.
|
release. For more details please read the CHANGES file.
|
||||||
|
|
||||||
Major changes between OpenSSL 1.0.1h and OpenSSL 1.0.2 [in beta]:
|
Major changes between OpenSSL 1.0.1i and OpenSSL 1.0.2 [in beta]:
|
||||||
|
|
||||||
o Suite B support for TLS 1.2 and DTLS 1.2
|
o Suite B support for TLS 1.2 and DTLS 1.2
|
||||||
o Support for DTLS 1.2
|
o Support for DTLS 1.2
|
||||||
@ -16,6 +16,18 @@
|
|||||||
o ALPN support.
|
o ALPN support.
|
||||||
o CMS support for RSA-PSS, RSA-OAEP, ECDH and X9.42 DH.
|
o CMS support for RSA-PSS, RSA-OAEP, ECDH and X9.42 DH.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.1h and OpenSSL 1.0.1i [6 Aug 2014]
|
||||||
|
|
||||||
|
o Fix for CVE-2014-3512
|
||||||
|
o Fix for CVE-2014-3511
|
||||||
|
o Fix for CVE-2014-3510
|
||||||
|
o Fix for CVE-2014-3507
|
||||||
|
o Fix for CVE-2014-3506
|
||||||
|
o Fix for CVE-2014-3505
|
||||||
|
o Fix for CVE-2014-3509
|
||||||
|
o Fix for CVE-2014-5139
|
||||||
|
o Fix for CVE-2014-3508
|
||||||
|
|
||||||
Major changes between OpenSSL 1.0.1g and OpenSSL 1.0.1h [5 Jun 2014]
|
Major changes between OpenSSL 1.0.1g and OpenSSL 1.0.1h [5 Jun 2014]
|
||||||
|
|
||||||
o Fix for CVE-2014-0224
|
o Fix for CVE-2014-0224
|
||||||
|
Loading…
x
Reference in New Issue
Block a user