X-Git-Url: https://git.openssl.org/gitweb/?p=openssl.git;a=blobdiff_plain;f=CHANGES;h=d5142beebbc7855c872907806553b98a981779a2;hp=be2212db7be0f7b0c997f26911c9f0d1f0c15434;hb=dcca7b13e9066443237dd3001ae52fd103151c98;hpb=cd6bd5ffda616822b52104fee0c4c7d623fd4f53 diff --git a/CHANGES b/CHANGES index be2212db7b..d5142beebb 100644 --- a/CHANGES +++ b/CHANGES @@ -4,6 +4,26 @@ Changes between 1.0.2 and 1.1.0 [xx XXX xxxx] + *) Harmonize version and its documentation. -f flag is used to display + compilation flags. + [mancha ] + + *) Fix eckey_priv_encode so it immediately returns an error upon a failure + in i2d_ECPrivateKey. + [mancha ] + + *) Fix some double frees. These are not thought to be exploitable. + [mancha ] + + *) A missing bounds check in the handling of the TLS heartbeat extension + can be used to reveal up to 64k of memory to a connected client or + server. + + Thanks for Neel Mehta of Google Security for discovering this bug and to + Adam Langley and Bodo Moeller for + preparing the fix (CVE-2014-0160) + [Adam Langley, Bodo Moeller] + *) Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" by Yuval Yarom and Naomi Benger. Details can be obtained from: