diff options
author | Matt Caswell <matt@openssl.org> | 2015-12-01 14:39:47 +0000 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2015-12-02 23:36:05 +0000 |
commit | a402b2b7bcff8d6901aa771e49c45cf38836e7bf (patch) | |
tree | d06fe925fa0936d2f52e6a563310e624ff787094 | |
parent | d275dbe6eb7b720b8920f712eea79044f845a4bb (diff) |
Update CHANGES and NEWS
Update the CHANGES and NEWS files for the new release.
Reviewed-by: Rich Salz <rsalz@openssl.org>
-rw-r--r-- | CHANGES | 21 | ||||
-rw-r--r-- | NEWS | 3 |
2 files changed, 22 insertions, 2 deletions
@@ -4,7 +4,26 @@ Changes between 1.0.0s and 1.0.0t [xx XXX xxxx] - *) + *) X509_ATTRIBUTE memory leak + + When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak + memory. This structure is used by the PKCS#7 and CMS routines so any + application which reads PKCS#7 or CMS data from untrusted sources is + affected. SSL/TLS is not affected. + + This issue was reported to OpenSSL by Adam Langley (Google/BoringSSL) using + libFuzzer. + (CVE-2015-3195) + [Stephen Henson] + + *) Race condition handling PSK identify hint + + If PSK identity hints are received by a multi-threaded client then + the values are wrongly updated in the parent SSL_CTX structure. This can + result in a race condition potentially leading to a double free of the + identify hint data. + (CVE-2015-3196) + [Stephen Henson] Changes between 1.0.0r and 1.0.0s [11 Jun 2015] @@ -7,7 +7,8 @@ Major changes between OpenSSL 1.0.0s and OpenSSL 1.0.0t [under development] - o + o X509_ATTRIBUTE memory leak (CVE-2015-3195) + o Race condition handling PSK identify hint (CVE-2015-3196) Major changes between OpenSSL 1.0.0r and OpenSSL 1.0.0s [11 Jun 2015] |