Commit f11bedf8 authored by Bodo Moeller's avatar Bodo Moeller
Browse files

Sync CHANGES and NEWS files.

parent c23746f3
Loading
Loading
Loading
Loading
+84 −1
Original line number Diff line number Diff line
@@ -37,6 +37,9 @@

 Changes between 1.0.0i and 1.0.0j [10 May 2012]

  [NB: OpenSSL 1.0.0i and later 1.0.0 patch levels were released after
  OpenSSL 1.0.1.]

  *) Sanity check record length before skipping explicit IV in DTLS
     to fix DoS attack.

@@ -1050,6 +1053,86 @@
  *) Change 'Configure' script to enable Camellia by default.
     [NTT]

 Changes between 0.9.8x and 0.9.8y [5 Feb 2013]

  *) Make the decoding of SSLv3, TLS and DTLS CBC records constant time.

     This addresses the flaw in CBC record processing discovered by 
     Nadhem Alfardan and Kenny Paterson. Details of this attack can be found
     at: http://www.isg.rhul.ac.uk/tls/     

     Thanks go to Nadhem Alfardan and Kenny Paterson of the Information
     Security Group at Royal Holloway, University of London
     (www.isg.rhul.ac.uk) for discovering this flaw and Adam Langley and
     Emilia Käsper for the initial patch.
     (CVE-2013-0169)
     [Emilia Käsper, Adam Langley, Ben Laurie, Andy Polyakov, Steve Henson]

  *) Return an error when checking OCSP signatures when key is NULL.
     This fixes a DoS attack. (CVE-2013-0166)
     [Steve Henson]

  *) Call OCSP Stapling callback after ciphersuite has been chosen, so
     the right response is stapled. Also change SSL_get_certificate()
     so it returns the certificate actually sent.
     See http://rt.openssl.org/Ticket/Display.html?id=2836.
     (This is a backport)
     [Rob Stradling <rob.stradling@comodo.com>]

  *) Fix possible deadlock when decoding public keys.
     [Steve Henson]

 Changes between 0.9.8w and 0.9.8x [10 May 2012]

  *) Sanity check record length before skipping explicit IV in DTLS
     to fix DoS attack.

     Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic
     fuzzing as a service testing platform.
     (CVE-2012-2333)
     [Steve Henson]

  *) Initialise tkeylen properly when encrypting CMS messages.
     Thanks to Solar Designer of Openwall for reporting this issue.
     [Steve Henson]

 Changes between 0.9.8v and 0.9.8w [23 Apr 2012]

  *) The fix for CVE-2012-2110 did not take into account that the 
     'len' argument to BUF_MEM_grow and BUF_MEM_grow_clean is an
     int in OpenSSL 0.9.8, making it still vulnerable. Fix by 
     rejecting negative len parameter. (CVE-2012-2131)
     [Tomas Hoger <thoger@redhat.com>]

 Changes between 0.9.8u and 0.9.8v [19 Apr 2012]

  *) Check for potentially exploitable overflows in asn1_d2i_read_bio
     BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer
     in CRYPTO_realloc_clean.

     Thanks to Tavis Ormandy, Google Security Team, for discovering this
     issue and to Adam Langley <agl@chromium.org> for fixing it.
     (CVE-2012-2110)
     [Adam Langley (Google), Tavis Ormandy, Google Security Team]

 Changes between 0.9.8t and 0.9.8u [12 Mar 2012]

  *) Fix MMA (Bleichenbacher's attack on PKCS #1 v1.5 RSA padding) weakness
     in CMS and PKCS7 code. When RSA decryption fails use a random key for
     content decryption and always return the same error. Note: this attack
     needs on average 2^20 messages so it only affects automated senders. The
     old behaviour can be reenabled in the CMS code by setting the
     CMS_DEBUG_DECRYPT flag: this is useful for debugging and testing where
     an MMA defence is not necessary.
     Thanks to Ivan Nestlerode <inestlerode@us.ibm.com> for discovering
     this issue. (CVE-2012-0884)
     [Steve Henson]

  *) Fix CVE-2011-4619: make sure we really are receiving a 
     client hello before rejecting multiple SGC restarts. Thanks to
     Ivan Nestlerode <inestlerode@us.ibm.com> for discovering this bug.
     [Steve Henson]

 Changes between 0.9.8s and 0.9.8t [18 Jan 2012]

  *) Fix for DTLS DoS issue introduced by fix for CVE-2011-4109.
+35 −0
Original line number Diff line number Diff line
@@ -90,6 +90,41 @@
      o Opaque PRF Input TLS extension support.
      o Updated time routines to avoid OS limitations.

  Major changes between OpenSSL 0.9.8x and OpenSSL 0.9.8y:

      o Fix for SSL/TLS/DTLS CBC plaintext recovery attack CVE-2013-0169
      o Fix OCSP bad key DoS attack CVE-2013-0166

  Major changes between OpenSSL 0.9.8w and OpenSSL 0.9.8x:

      o Fix DTLS record length checking bug CVE-2012-2333

  Major changes between OpenSSL 0.9.8v and OpenSSL 0.9.8w:

      o Fix for CVE-2012-2131 (corrected fix for 0.9.8 and CVE-2012-2110)

  Major changes between OpenSSL 0.9.8u and OpenSSL 0.9.8v:

      o Fix for ASN1 overflow bug CVE-2012-2110

  Major changes between OpenSSL 0.9.8t and OpenSSL 0.9.8u:

      o Fix for CMS/PKCS#7 MMA CVE-2012-0884
      o Corrected fix for CVE-2011-4619
      o Various DTLS fixes.

  Major changes between OpenSSL 0.9.8s and OpenSSL 0.9.8t:

      o Fix for DTLS DoS issue CVE-2012-0050

  Major changes between OpenSSL 0.9.8r and OpenSSL 0.9.8s:

      o Fix for DTLS plaintext recovery attack CVE-2011-4108
      o Fix policy check double free error CVE-2011-4109
      o Clear block padding bytes of SSL 3.0 records CVE-2011-4576
      o Only allow one SGC handshake restart for SSL/TLS CVE-2011-4619
      o Check for malformed RFC3779 data CVE-2011-4577

  Major changes between OpenSSL 0.9.8q and OpenSSL 0.9.8r:

      o Fix for security issue CVE-2011-0014