Sync CHANGES and NEWS files.
This commit is contained in:
parent
0aeeae0c9c
commit
cc53b38574
139
CHANGES
139
CHANGES
@ -410,6 +410,63 @@
|
|||||||
Add command line options to s_client/s_server.
|
Add command line options to s_client/s_server.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
|
Changes between 1.0.0j and 1.0.0k [5 Feb 2013]
|
||||||
|
|
||||||
|
*) Make the decoding of SSLv3, TLS and DTLS CBC records constant time.
|
||||||
|
|
||||||
|
This addresses the flaw in CBC record processing discovered by
|
||||||
|
Nadhem Alfardan and Kenny Paterson. Details of this attack can be found
|
||||||
|
at: http://www.isg.rhul.ac.uk/tls/
|
||||||
|
|
||||||
|
Thanks go to Nadhem Alfardan and Kenny Paterson of the Information
|
||||||
|
Security Group at Royal Holloway, University of London
|
||||||
|
(www.isg.rhul.ac.uk) for discovering this flaw and Adam Langley and
|
||||||
|
Emilia Käsper for the initial patch.
|
||||||
|
(CVE-2013-0169)
|
||||||
|
[Emilia Käsper, Adam Langley, Ben Laurie, Andy Polyakov, Steve Henson]
|
||||||
|
|
||||||
|
*) Return an error when checking OCSP signatures when key is NULL.
|
||||||
|
This fixes a DoS attack. (CVE-2013-0166)
|
||||||
|
[Steve Henson]
|
||||||
|
|
||||||
|
*) Call OCSP Stapling callback after ciphersuite has been chosen, so
|
||||||
|
the right response is stapled. Also change SSL_get_certificate()
|
||||||
|
so it returns the certificate actually sent.
|
||||||
|
See http://rt.openssl.org/Ticket/Display.html?id=2836.
|
||||||
|
(This is a backport)
|
||||||
|
[Rob Stradling <rob.stradling@comodo.com>]
|
||||||
|
|
||||||
|
*) Fix possible deadlock when decoding public keys.
|
||||||
|
[Steve Henson]
|
||||||
|
|
||||||
|
Changes between 1.0.0i and 1.0.0j [10 May 2012]
|
||||||
|
|
||||||
|
[NB: OpenSSL 1.0.0i and later 1.0.0 patch levels were released after
|
||||||
|
OpenSSL 1.0.1.]
|
||||||
|
|
||||||
|
*) Sanity check record length before skipping explicit IV in DTLS
|
||||||
|
to fix DoS attack.
|
||||||
|
|
||||||
|
Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic
|
||||||
|
fuzzing as a service testing platform.
|
||||||
|
(CVE-2012-2333)
|
||||||
|
[Steve Henson]
|
||||||
|
|
||||||
|
*) Initialise tkeylen properly when encrypting CMS messages.
|
||||||
|
Thanks to Solar Designer of Openwall for reporting this issue.
|
||||||
|
[Steve Henson]
|
||||||
|
|
||||||
|
Changes between 1.0.0h and 1.0.0i [19 Apr 2012]
|
||||||
|
|
||||||
|
*) Check for potentially exploitable overflows in asn1_d2i_read_bio
|
||||||
|
BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer
|
||||||
|
in CRYPTO_realloc_clean.
|
||||||
|
|
||||||
|
Thanks to Tavis Ormandy, Google Security Team, for discovering this
|
||||||
|
issue and to Adam Langley <agl@chromium.org> for fixing it.
|
||||||
|
(CVE-2012-2110)
|
||||||
|
[Adam Langley (Google), Tavis Ormandy, Google Security Team]
|
||||||
|
|
||||||
Changes between 1.0.0g and 1.0.0h [12 Mar 2012]
|
Changes between 1.0.0g and 1.0.0h [12 Mar 2012]
|
||||||
|
|
||||||
*) Fix MMA (Bleichenbacher's attack on PKCS #1 v1.5 RSA padding) weakness
|
*) Fix MMA (Bleichenbacher's attack on PKCS #1 v1.5 RSA padding) weakness
|
||||||
@ -1400,6 +1457,86 @@
|
|||||||
*) Change 'Configure' script to enable Camellia by default.
|
*) Change 'Configure' script to enable Camellia by default.
|
||||||
[NTT]
|
[NTT]
|
||||||
|
|
||||||
|
Changes between 0.9.8x and 0.9.8y [5 Feb 2013]
|
||||||
|
|
||||||
|
*) Make the decoding of SSLv3, TLS and DTLS CBC records constant time.
|
||||||
|
|
||||||
|
This addresses the flaw in CBC record processing discovered by
|
||||||
|
Nadhem Alfardan and Kenny Paterson. Details of this attack can be found
|
||||||
|
at: http://www.isg.rhul.ac.uk/tls/
|
||||||
|
|
||||||
|
Thanks go to Nadhem Alfardan and Kenny Paterson of the Information
|
||||||
|
Security Group at Royal Holloway, University of London
|
||||||
|
(www.isg.rhul.ac.uk) for discovering this flaw and Adam Langley and
|
||||||
|
Emilia Käsper for the initial patch.
|
||||||
|
(CVE-2013-0169)
|
||||||
|
[Emilia Käsper, Adam Langley, Ben Laurie, Andy Polyakov, Steve Henson]
|
||||||
|
|
||||||
|
*) Return an error when checking OCSP signatures when key is NULL.
|
||||||
|
This fixes a DoS attack. (CVE-2013-0166)
|
||||||
|
[Steve Henson]
|
||||||
|
|
||||||
|
*) Call OCSP Stapling callback after ciphersuite has been chosen, so
|
||||||
|
the right response is stapled. Also change SSL_get_certificate()
|
||||||
|
so it returns the certificate actually sent.
|
||||||
|
See http://rt.openssl.org/Ticket/Display.html?id=2836.
|
||||||
|
(This is a backport)
|
||||||
|
[Rob Stradling <rob.stradling@comodo.com>]
|
||||||
|
|
||||||
|
*) Fix possible deadlock when decoding public keys.
|
||||||
|
[Steve Henson]
|
||||||
|
|
||||||
|
Changes between 0.9.8w and 0.9.8x [10 May 2012]
|
||||||
|
|
||||||
|
*) Sanity check record length before skipping explicit IV in DTLS
|
||||||
|
to fix DoS attack.
|
||||||
|
|
||||||
|
Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic
|
||||||
|
fuzzing as a service testing platform.
|
||||||
|
(CVE-2012-2333)
|
||||||
|
[Steve Henson]
|
||||||
|
|
||||||
|
*) Initialise tkeylen properly when encrypting CMS messages.
|
||||||
|
Thanks to Solar Designer of Openwall for reporting this issue.
|
||||||
|
[Steve Henson]
|
||||||
|
|
||||||
|
Changes between 0.9.8v and 0.9.8w [23 Apr 2012]
|
||||||
|
|
||||||
|
*) The fix for CVE-2012-2110 did not take into account that the
|
||||||
|
'len' argument to BUF_MEM_grow and BUF_MEM_grow_clean is an
|
||||||
|
int in OpenSSL 0.9.8, making it still vulnerable. Fix by
|
||||||
|
rejecting negative len parameter. (CVE-2012-2131)
|
||||||
|
[Tomas Hoger <thoger@redhat.com>]
|
||||||
|
|
||||||
|
Changes between 0.9.8u and 0.9.8v [19 Apr 2012]
|
||||||
|
|
||||||
|
*) Check for potentially exploitable overflows in asn1_d2i_read_bio
|
||||||
|
BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer
|
||||||
|
in CRYPTO_realloc_clean.
|
||||||
|
|
||||||
|
Thanks to Tavis Ormandy, Google Security Team, for discovering this
|
||||||
|
issue and to Adam Langley <agl@chromium.org> for fixing it.
|
||||||
|
(CVE-2012-2110)
|
||||||
|
[Adam Langley (Google), Tavis Ormandy, Google Security Team]
|
||||||
|
|
||||||
|
Changes between 0.9.8t and 0.9.8u [12 Mar 2012]
|
||||||
|
|
||||||
|
*) Fix MMA (Bleichenbacher's attack on PKCS #1 v1.5 RSA padding) weakness
|
||||||
|
in CMS and PKCS7 code. When RSA decryption fails use a random key for
|
||||||
|
content decryption and always return the same error. Note: this attack
|
||||||
|
needs on average 2^20 messages so it only affects automated senders. The
|
||||||
|
old behaviour can be reenabled in the CMS code by setting the
|
||||||
|
CMS_DEBUG_DECRYPT flag: this is useful for debugging and testing where
|
||||||
|
an MMA defence is not necessary.
|
||||||
|
Thanks to Ivan Nestlerode <inestlerode@us.ibm.com> for discovering
|
||||||
|
this issue. (CVE-2012-0884)
|
||||||
|
[Steve Henson]
|
||||||
|
|
||||||
|
*) Fix CVE-2011-4619: make sure we really are receiving a
|
||||||
|
client hello before rejecting multiple SGC restarts. Thanks to
|
||||||
|
Ivan Nestlerode <inestlerode@us.ibm.com> for discovering this bug.
|
||||||
|
[Steve Henson]
|
||||||
|
|
||||||
Changes between 0.9.8s and 0.9.8t [18 Jan 2012]
|
Changes between 0.9.8s and 0.9.8t [18 Jan 2012]
|
||||||
|
|
||||||
*) Fix for DTLS DoS issue introduced by fix for CVE-2011-4109.
|
*) Fix for DTLS DoS issue introduced by fix for CVE-2011-4109.
|
||||||
@ -1407,7 +1544,7 @@
|
|||||||
Development, Cisco Systems, Inc. for discovering this bug and
|
Development, Cisco Systems, Inc. for discovering this bug and
|
||||||
preparing a fix. (CVE-2012-0050)
|
preparing a fix. (CVE-2012-0050)
|
||||||
[Antonio Martin]
|
[Antonio Martin]
|
||||||
|
|
||||||
Changes between 0.9.8r and 0.9.8s [4 Jan 2012]
|
Changes between 0.9.8r and 0.9.8s [4 Jan 2012]
|
||||||
|
|
||||||
*) Nadhem Alfardan and Kenny Paterson have discovered an extension
|
*) Nadhem Alfardan and Kenny Paterson have discovered an extension
|
||||||
|
48
NEWS
48
NEWS
@ -47,6 +47,19 @@
|
|||||||
o Preliminary FIPS capability for unvalidated 2.0 FIPS module.
|
o Preliminary FIPS capability for unvalidated 2.0 FIPS module.
|
||||||
o SRP support.
|
o SRP support.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.0j and OpenSSL 1.0.0k:
|
||||||
|
|
||||||
|
o Fix for SSL/TLS/DTLS CBC plaintext recovery attack CVE-2013-0169
|
||||||
|
o Fix OCSP bad key DoS attack CVE-2013-0166
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.0i and OpenSSL 1.0.0j:
|
||||||
|
|
||||||
|
o Fix DTLS record length checking bug CVE-2012-2333
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.0.0h and OpenSSL 1.0.0i:
|
||||||
|
|
||||||
|
o Fix for ASN1 overflow bug CVE-2012-2110
|
||||||
|
|
||||||
Major changes between OpenSSL 1.0.0g and OpenSSL 1.0.0h:
|
Major changes between OpenSSL 1.0.0g and OpenSSL 1.0.0h:
|
||||||
|
|
||||||
o Fix for CMS/PKCS#7 MMA CVE-2012-0884
|
o Fix for CMS/PKCS#7 MMA CVE-2012-0884
|
||||||
@ -119,6 +132,41 @@
|
|||||||
o Opaque PRF Input TLS extension support.
|
o Opaque PRF Input TLS extension support.
|
||||||
o Updated time routines to avoid OS limitations.
|
o Updated time routines to avoid OS limitations.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8x and OpenSSL 0.9.8y:
|
||||||
|
|
||||||
|
o Fix for SSL/TLS/DTLS CBC plaintext recovery attack CVE-2013-0169
|
||||||
|
o Fix OCSP bad key DoS attack CVE-2013-0166
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8w and OpenSSL 0.9.8x:
|
||||||
|
|
||||||
|
o Fix DTLS record length checking bug CVE-2012-2333
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8v and OpenSSL 0.9.8w:
|
||||||
|
|
||||||
|
o Fix for CVE-2012-2131 (corrected fix for 0.9.8 and CVE-2012-2110)
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8u and OpenSSL 0.9.8v:
|
||||||
|
|
||||||
|
o Fix for ASN1 overflow bug CVE-2012-2110
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8t and OpenSSL 0.9.8u:
|
||||||
|
|
||||||
|
o Fix for CMS/PKCS#7 MMA CVE-2012-0884
|
||||||
|
o Corrected fix for CVE-2011-4619
|
||||||
|
o Various DTLS fixes.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8s and OpenSSL 0.9.8t:
|
||||||
|
|
||||||
|
o Fix for DTLS DoS issue CVE-2012-0050
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8r and OpenSSL 0.9.8s:
|
||||||
|
|
||||||
|
o Fix for DTLS plaintext recovery attack CVE-2011-4108
|
||||||
|
o Fix policy check double free error CVE-2011-4109
|
||||||
|
o Clear block padding bytes of SSL 3.0 records CVE-2011-4576
|
||||||
|
o Only allow one SGC handshake restart for SSL/TLS CVE-2011-4619
|
||||||
|
o Check for malformed RFC3779 data CVE-2011-4577
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8q and OpenSSL 0.9.8r:
|
Major changes between OpenSSL 0.9.8q and OpenSSL 0.9.8r:
|
||||||
|
|
||||||
o Fix for security issue CVE-2011-0014
|
o Fix for security issue CVE-2011-0014
|
||||||
|
Loading…
Reference in New Issue
Block a user