X-Git-Url: https://git.openssl.org/gitweb/?p=openssl.git;a=blobdiff_plain;f=CHANGES;h=d5142beebbc7855c872907806553b98a981779a2;hp=1df12173dee728e12338d08fe7cda99cb1192b38;hb=8acb953880bc7fc5ed4e339de06dff0a213fa274;hpb=0467ea68624450ecece4cde0d5803499aaff19c2 diff --git a/CHANGES b/CHANGES index 1df12173de..d5142beebb 100644 --- a/CHANGES +++ b/CHANGES @@ -4,17 +4,37 @@ Changes between 1.0.2 and 1.1.0 [xx XXX xxxx] - *) Experimental workaround TLS filler (WTF) extension. Based on a suggested - workaround for the "TLS hang bug" (see FAQ and PR#2771): if the TLS client - Hello record length value would otherwise be > 255 and less that 512 - pad with a dummy extension containing zeroes so it is at least 512 bytes - long. + *) Harmonize version and its documentation. -f flag is used to display + compilation flags. + [mancha ] - To enable it use an unused extension number (for example 0x4242) using - e.g. -DTLSEXT_TYPE_wtf=0x4242 + *) Fix eckey_priv_encode so it immediately returns an error upon a failure + in i2d_ECPrivateKey. + [mancha ] - WARNING: EXPERIMENTAL, SUBJECT TO CHANGE. - + *) Fix some double frees. These are not thought to be exploitable. + [mancha ] + + *) A missing bounds check in the handling of the TLS heartbeat extension + can be used to reveal up to 64k of memory to a connected client or + server. + + Thanks for Neel Mehta of Google Security for discovering this bug and to + Adam Langley and Bodo Moeller for + preparing the fix (CVE-2014-0160) + [Adam Langley, Bodo Moeller] + + *) Fix for the attack described in the paper "Recovering OpenSSL + ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" + by Yuval Yarom and Naomi Benger. Details can be obtained from: + http://eprint.iacr.org/2014/140 + + Thanks to Yuval Yarom and Naomi Benger for discovering this + flaw and to Yuval Yarom for supplying a fix (CVE-2014-0076) + [Yuval Yarom and Naomi Benger] + + *) Use algorithm specific chains in SSL_CTX_use_certificate_chain_file(): + this fixes a limiation in previous versions of OpenSSL. [Steve Henson] *) Experimental encrypt-then-mac support. @@ -286,6 +306,20 @@ Changes between 1.0.1e and 1.0.2 [xx XXX xxxx] + *) Keep original DTLS digest and encryption contexts in retransmission + structures so we can use the previous session parameters if they need + to be resent. (CVE-2013-6450) + [Steve Henson] + + *) TLS pad extension: draft-agl-tls-padding-03 + + Workaround for the "TLS hang bug" (see FAQ and PR#2771): if the + TLS client Hello record length value would otherwise be > 255 and + less that 512 pad with a dummy extension containing zeroes so it + is at least 512 bytes long. + + [Adam Langley, Steve Henson] + *) Add functions to allocate and set the fields of an ECDSA_METHOD structure. [Douglas E. Engert, Steve Henson] @@ -2014,6 +2048,10 @@ This fixes a DoS attack. (CVE-2013-0166) [Steve Henson] + *) Return an error when checking OCSP signatures when key is NULL. + This fixes a DoS attack. (CVE-2013-0166) + [Steve Henson] + *) Call OCSP Stapling callback after ciphersuite has been chosen, so the right response is stapled. Also change SSL_get_certificate() so it returns the certificate actually sent.