Skip to content

Commit

Permalink
Update CHANGES and NEWS for new release
Browse files Browse the repository at this point in the history
Reviewed-by: Richard Levitte <[email protected]>
  • Loading branch information
mattcaswell committed Jan 26, 2017
1 parent 3f4bcf5 commit 536454e
Show file tree
Hide file tree
Showing 2 changed files with 54 additions and 2 deletions.
45 changes: 44 additions & 1 deletion CHANGES
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,50 @@
*) Support for SSL_OP_NO_ENCRYPT_THEN_MAC in SSL_CONF_cmd.
[Emilia Käsper]

Changes between 1.1.0b and 1.1.0c [xx XXX xxxx]
Changes between 1.1.0c and 1.1.0d [26 Jan 2017]

*) Truncated packet could crash via OOB read

If one side of an SSL/TLS path is running on a 32-bit host and a specific
cipher is being used, then a truncated packet can cause that host to
perform an out-of-bounds read, usually resulting in a crash.

This issue was reported to OpenSSL by Robert Święcki of Google.
(CVE-2017-3731)
[Andy Polyakov]

*) Bad (EC)DHE parameters cause a client crash

If a malicious server supplies bad parameters for a DHE or ECDHE key
exchange then this can result in the client attempting to dereference a
NULL pointer leading to a client crash. This could be exploited in a Denial
of Service attack.

This issue was reported to OpenSSL by Guido Vranken.
(CVE-2017-3730)
[Matt Caswell]

*) BN_mod_exp may produce incorrect results on x86_64

There is a carry propagating bug in the x86_64 Montgomery squaring
procedure. No EC algorithms are affected. Analysis suggests that attacks
against RSA and DSA as a result of this defect would be very difficult to
perform and are not believed likely. Attacks against DH are considered just
feasible (although very difficult) because most of the work necessary to
deduce information about a private key may be performed offline. The amount
of resources required for such an attack would be very significant and
likely only accessible to a limited number of attackers. An attacker would
additionally need online access to an unpatched system using the target
private key in a scenario with persistent DH parameters and a private
key that is shared between multiple clients. For example this can occur by
default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very
similar to CVE-2015-3193 but must be treated as a separate problem.

This issue was reported to OpenSSL by the OSS-Fuzz project.
(CVE-2017-3732)
[Andy Polyakov]

Changes between 1.1.0b and 1.1.0c [10 Nov 2016]

*) ChaCha20/Poly1305 heap-buffer-overflow

Expand Down
11 changes: 10 additions & 1 deletion NEWS
Original file line number Diff line number Diff line change
Expand Up @@ -9,11 +9,20 @@

o

Major changes between OpenSSL 1.1.0a and OpenSSL 1.1.0b [26 Sep 2016]
Major changes between OpenSSL 1.1.0c and OpenSSL 1.1.0d [26 Jan 2017]

o Truncated packet could crash via OOB read (CVE-2017-3731)
o Bad (EC)DHE parameters cause a client crash (CVE-2017-3730)
o BN_mod_exp may produce incorrect results on x86_64 (CVE-2017-3732)

Major changes between OpenSSL 1.1.0b and OpenSSL 1.1.0c [10 Nov 2016]

o ChaCha20/Poly1305 heap-buffer-overflow (CVE-2016-7054)
o CMS Null dereference (CVE-2016-7053)
o Montgomery multiplication may produce incorrect results (CVE-2016-7055)

Major changes between OpenSSL 1.1.0a and OpenSSL 1.1.0b [26 Sep 2016]

o Fix Use After Free for large message sizes (CVE-2016-6309)

Major changes between OpenSSL 1.1.0 and OpenSSL 1.1.0a [22 Sep 2016]
Expand Down

0 comments on commit 536454e

Please sign in to comment.