Commit 5fed60f9 authored by Matt Caswell's avatar Matt Caswell
Browse files

Update CHANGES and NEWS ready for release



Update CHANGES and NEWS with details of the issues fixed in the forthcoming
release.

Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
parent 4040a7fd
Loading
Loading
Loading
Loading
+12 −0
Original line number Diff line number Diff line
@@ -4,6 +4,18 @@

 Changes between 1.0.1q and 1.0.1r [xx XXX xxxx]

  *) SSLv2 doesn't block disabled ciphers

     A malicious client can negotiate SSLv2 ciphers that have been disabled on
     the server and complete SSLv2 handshakes even if all SSLv2 ciphers have
     been disabled, provided that the SSLv2 protocol was not also disabled via
     SSL_OP_NO_SSLv2.

     This issue was reported to OpenSSL on 26th December 2015 by Nimrod Aviram
     and Sebastian Schinzel.
     (CVE-2015-3197)
     [Viktor Dukhovni]

  *) Reject DH handshakes with parameters shorter than 1024 bits.
     [Kurt Roeckx]

+1 −1
Original line number Diff line number Diff line
@@ -7,7 +7,7 @@

  Major changes between OpenSSL 1.0.1q and OpenSSL 1.0.1r [under development]

      o
      o SSLv2 doesn't block disabled ciphers (CVE-2015-3197)

  Major changes between OpenSSL 1.0.1p and OpenSSL 1.0.1q [3 Dec 2015]