X-Git-Url: https://git.librecmc.org/?a=blobdiff_plain;f=CHANGES;h=b2871e96603316c3b6b1803fed7a676398b2b7eb;hb=05689a132cbb40800677486317c0694fa65fd118;hp=199e70fc72f29d07a97ba3722f0889746fb147a3;hpb=04e40739f75de96e601c694b723a4503b3895645;p=oweals%2Fopenssl.git diff --git a/CHANGES b/CHANGES index 199e70fc72..b2871e9660 100644 --- a/CHANGES +++ b/CHANGES @@ -2,7 +2,28 @@ OpenSSL CHANGES _______________ - Changes between 0.9.8x and 0.9.8y [xx XXX xxxx] + Changes between 0.9.8y and 0.9.8za [xx XXX xxxx] + + *) + + Changes between 0.9.8x and 0.9.8y [5 Feb 2013] + + *) Make the decoding of SSLv3, TLS and DTLS CBC records constant time. + + This addresses the flaw in CBC record processing discovered by + Nadhem Alfardan and Kenny Paterson. Details of this attack can be found + at: http://www.isg.rhul.ac.uk/tls/ + + Thanks go to Nadhem Alfardan and Kenny Paterson of the Information + Security Group at Royal Holloway, University of London + (www.isg.rhul.ac.uk) for discovering this flaw and Adam Langley and + Emilia Käsper for the initial patch. + (CVE-2013-0169) + [Emilia Käsper, Adam Langley, Ben Laurie, Andy Polyakov, Steve Henson] + + *) Return an error when checking OCSP signatures when key is NULL. + This fixes a DoS attack. (CVE-2013-0166) + [Steve Henson] *) Call OCSP Stapling callback after ciphersuite has been chosen, so the right response is stapled. Also change SSL_get_certificate()