X-Git-Url: https://git.librecmc.org/?a=blobdiff_plain;f=CHANGES;h=b2871e96603316c3b6b1803fed7a676398b2b7eb;hb=05689a132cbb40800677486317c0694fa65fd118;hp=d7d37ff7756d2c7cb4d079aa9a34e584d5f07e29;hpb=36dd4cba3dfa87aebd59d10c844fdda3a31b89db;p=oweals%2Fopenssl.git diff --git a/CHANGES b/CHANGES index d7d37ff775..b2871e9660 100644 --- a/CHANGES +++ b/CHANGES @@ -2,7 +2,40 @@ OpenSSL CHANGES _______________ - Changes between 0.9.8w and 0.9.8x [xx XXX xxxx] + Changes between 0.9.8y and 0.9.8za [xx XXX xxxx] + + *) + + Changes between 0.9.8x and 0.9.8y [5 Feb 2013] + + *) Make the decoding of SSLv3, TLS and DTLS CBC records constant time. + + This addresses the flaw in CBC record processing discovered by + Nadhem Alfardan and Kenny Paterson. Details of this attack can be found + at: http://www.isg.rhul.ac.uk/tls/ + + Thanks go to Nadhem Alfardan and Kenny Paterson of the Information + Security Group at Royal Holloway, University of London + (www.isg.rhul.ac.uk) for discovering this flaw and Adam Langley and + Emilia Käsper for the initial patch. + (CVE-2013-0169) + [Emilia Käsper, Adam Langley, Ben Laurie, Andy Polyakov, Steve Henson] + + *) Return an error when checking OCSP signatures when key is NULL. + This fixes a DoS attack. (CVE-2013-0166) + [Steve Henson] + + *) Call OCSP Stapling callback after ciphersuite has been chosen, so + the right response is stapled. Also change SSL_get_certificate() + so it returns the certificate actually sent. + See http://rt.openssl.org/Ticket/Display.html?id=2836. + (This is a backport) + [Rob Stradling ] + + *) Fix possible deadlock when decoding public keys. + [Steve Henson] + + Changes between 0.9.8w and 0.9.8x [10 May 2012] *) Sanity check record length before skipping explicit IV in DTLS to fix DoS attack.