diff options
author | Bernd Edlinger <bernd.edlinger@hotmail.de> | 2019-12-05 01:20:14 +0100 |
---|---|---|
committer | Bernd Edlinger <bernd.edlinger@hotmail.de> | 2019-12-05 01:26:16 +0100 |
commit | 4975571a5dee8957f43aff70272dd9ab89f582cf (patch) | |
tree | 0bf8d880db2bd96b3925dcfd4a61b80524ad2e28 | |
parent | ec8fcae925cca769cfdae4e4dd5ec62d32110982 (diff) |
Add a CHANGES entry for CVE-2019-1551
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/10576)
-rw-r--r-- | CHANGES | 12 |
1 files changed, 11 insertions, 1 deletions
@@ -9,7 +9,17 @@ Changes between 1.0.2t and 1.0.2u [xx XXX xxxx] - *) + *) Fixed an an overflow bug in the x64_64 Montgomery squaring procedure + used in exponentiation with 512-bit moduli. No EC algorithms are + affected. Analysis suggests that attacks against 2-prime RSA1024, + 3-prime RSA1536, and DSA1024 as a result of this defect would be very + difficult to perform and are not believed likely. Attacks against DH512 + are considered just feasible. However, for an attack the target would + have to re-use the DH512 private key, which is not recommended anyway. + Also applications directly using the low level API BN_mod_exp may be + affected if they use BN_FLG_CONSTTIME. + (CVE-2019-1551) + [Andy Polyakov] Changes between 1.0.2s and 1.0.2t [10 Sep 2019] |