From: Matt Caswell <matt@openssl.org>
Date: Tue, 20 Nov 2018 10:52:53 +0000 (+0000)
Subject: Update CHANGES and NEWS for new release
X-Git-Tag: OpenSSL_1_0_2q~3
X-Git-Url: https://git.librecmc.org/?a=commitdiff_plain;h=548cce63dd401b89e26d049152e3f9465f82720f;p=oweals%2Fopenssl.git

Update CHANGES and NEWS for new release

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/7667)
---

diff --git a/CHANGES b/CHANGES
index fde66b5ba4..11d72327c5 100644
--- a/CHANGES
+++ b/CHANGES
@@ -22,6 +22,16 @@
      (CVE-2018-5407)
      [Billy Brumley]
 
+  *) Timing vulnerability in DSA signature generation
+
+     The OpenSSL DSA signature algorithm has been shown to be vulnerable to a
+     timing side channel attack. An attacker could use variations in the signing
+     algorithm to recover the private key.
+
+     This issue was reported to OpenSSL on 16th October 2018 by Samuel Weiser.
+     (CVE-2018-0734)
+     [Paul Dale]
+
   *) Resolve a compatibility issue in EC_GROUP handling with the FIPS Object
      Module, accidentally introduced while backporting security fixes from the
      development branch and hindering the use of ECC in FIPS mode.
diff --git a/NEWS b/NEWS
index 2c5f5f8330..38fe668ffa 100644
--- a/NEWS
+++ b/NEWS
@@ -7,7 +7,8 @@
 
   Major changes between OpenSSL 1.0.2p and OpenSSL 1.0.2q [under development]
 
-      o
+      o Microarchitecture timing vulnerability in ECC scalar multiplication (CVE-2018-5407)
+      o Timing vulnerability in DSA signature generation (CVE-2018-0734)
 
   Major changes between OpenSSL 1.0.2o and OpenSSL 1.0.2p [14 Aug 2018]