From: Bodo Möller Date: Thu, 26 Aug 2010 11:21:49 +0000 (+0000) Subject: Harmonize with OpenSSL_1_0_0-stable version of CHANGES. X-Git-Tag: OpenSSL_1_0_1-beta1~479 X-Git-Url: https://git.librecmc.org/?a=commitdiff_plain;h=4ecd2bafbb159c50aeb17b0f8132df677e7900bb;p=oweals%2Fopenssl.git Harmonize with OpenSSL_1_0_0-stable version of CHANGES. --- diff --git a/CHANGES b/CHANGES index 5ee3150c04..3f0afe02d9 100644 --- a/CHANGES +++ b/CHANGES @@ -875,7 +875,10 @@ *) Change 'Configure' script to enable Camellia by default. [NTT] - Changes between 0.9.8n and 0.9.8o [xx XXX xxxx] + Changes between 0.9.8n and 0.9.8o [01 Jun 2010] + + [NB: OpenSSL 0.9.8o and later 0.9.8 patch levels were released after + OpenSSL 1.0.0.] *) Correct a typo in the CMS ASN1 module which can result in invalid memory access or freeing data twice (CVE-2010-0742) @@ -886,6 +889,12 @@ SSL_library_init and not OpenSSL_add_all_algorithms() will fail. [Steve Henson] + *) VMS fixes: + Reduce copying into .apps and .test in makevms.com + Don't try to use blank CA certificate in CA.com + Allow use of C files from original directories in maketests.com + [Steven M. Schweda" ] + Changes between 0.9.8m and 0.9.8n [24 Mar 2010] *) When rejecting SSL/TLS records due to an incorrect version number, never @@ -894,8 +903,8 @@ - OpenSSL 0.9.8f if 'short' is longer than 16 bits, the previous behavior could result in a read attempt at NULL when receiving specific incorrect SSL/TLS records once record payload - protection is active. (CVE-2010-####) - [Bodo Moeller, Adam Langley] + protection is active. (CVE-2010-0740) + [Bodo Moeller, Adam Langley ] *) Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL could be crashed if the relevant tables were not present (e.g. chrooted).