summaryrefslogtreecommitdiff
path: root/CHANGES
diff options
context:
space:
mode:
authorTomasz Swierczek <t.swierczek@samsung.com>2019-03-12 10:02:53 +0100
committerTomasz Swierczek <t.swierczek@samsung.com>2019-03-12 10:02:53 +0100
commit87921530edac8c10b9347e9d47fa8d9239fa255a (patch)
tree2c399f42934c9a84f60d01968bf72a5c526deda6 /CHANGES
parent1f964107cef6adef924015b1d3c73722fb809a5c (diff)
downloadopenssl-87921530edac8c10b9347e9d47fa8d9239fa255a.tar.gz
openssl-87921530edac8c10b9347e9d47fa8d9239fa255a.tar.bz2
openssl-87921530edac8c10b9347e9d47fa8d9239fa255a.zip
Imported Upstream version 1.0.2rupstream/1.0.2r
Diffstat (limited to 'CHANGES')
-rw-r--r--CHANGES27
1 files changed, 27 insertions, 0 deletions
diff --git a/CHANGES b/CHANGES
index cd43552..850e13f 100644
--- a/CHANGES
+++ b/CHANGES
@@ -7,6 +7,33 @@
https://github.com/openssl/openssl/commits/ and pick the appropriate
release branch.
+ Changes between 1.0.2q and 1.0.2r [26 Feb 2019]
+
+ *) 0-byte record padding oracle
+
+ If an application encounters a fatal protocol error and then calls
+ SSL_shutdown() twice (once to send a close_notify, and once to receive one)
+ then OpenSSL can respond differently to the calling application if a 0 byte
+ record is received with invalid padding compared to if a 0 byte record is
+ received with an invalid MAC. If the application then behaves differently
+ based on that in a way that is detectable to the remote peer, then this
+ amounts to a padding oracle that could be used to decrypt data.
+
+ In order for this to be exploitable "non-stitched" ciphersuites must be in
+ use. Stitched ciphersuites are optimised implementations of certain
+ commonly used ciphersuites. Also the application must call SSL_shutdown()
+ twice even if a protocol error has occurred (applications should not do
+ this but some do anyway).
+
+ This issue was discovered by Juraj Somorovsky, Robert Merget and Nimrod
+ Aviram, with additional investigation by Steven Collison and Andrew
+ Hourselt. It was reported to OpenSSL on 10th December 2018.
+ (CVE-2019-1559)
+ [Matt Caswell]
+
+ *) Move strictness check from EVP_PKEY_asn1_new() to EVP_PKEY_asn1_add0().
+ [Richard Levitte]
+
Changes between 1.0.2p and 1.0.2q [20 Nov 2018]
*) Microarchitecture timing vulnerability in ECC scalar multiplication