diff options
author | Matt Caswell <matt@openssl.org> | 2017-11-02 11:23:17 +0000 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2017-11-02 12:03:59 +0000 |
commit | 64c46a982288b734a0e22156fdea735ff9b6e3e3 (patch) | |
tree | d5388bc0ed73321353a33cba1cdc8a50bfb70408 | |
parent | 38d600147331d36e74174ebbd4008b63188b321b (diff) |
Update CHANGES and NEWS for new release
Reviewed-by: Andy Polyakov <appro@openssl.org>
-rw-r--r-- | CHANGES | 31 | ||||
-rw-r--r-- | NEWS | 3 |
2 files changed, 32 insertions, 2 deletions
@@ -9,7 +9,36 @@ Changes between 1.0.2l and 1.0.2m [xx XXX xxxx] - *) + *) bn_sqrx8x_internal carry bug on x86_64 + + There is a carry propagating bug in the x86_64 Montgomery squaring + procedure. No EC algorithms are affected. Analysis suggests that attacks + against RSA and DSA as a result of this defect would be very difficult to + perform and are not believed likely. Attacks against DH are considered just + feasible (although very difficult) because most of the work necessary to + deduce information about a private key may be performed offline. The amount + of resources required for such an attack would be very significant and + likely only accessible to a limited number of attackers. An attacker would + additionally need online access to an unpatched system using the target + private key in a scenario with persistent DH parameters and a private + key that is shared between multiple clients. + + This only affects processors that support the BMI1, BMI2 and ADX extensions + like Intel Broadwell (5th generation) and later or AMD Ryzen. + + This issue was reported to OpenSSL by the OSS-Fuzz project. + (CVE-2017-3736) + [Andy Polyakov] + + *) Malformed X.509 IPAddressFamily could cause OOB read + + If an X.509 certificate has a malformed IPAddressFamily extension, + OpenSSL could do a one-byte buffer overread. The most likely result + would be an erroneous display of the certificate in text format. + + This issue was reported to OpenSSL by the OSS-Fuzz project. + (CVE-2017-3735) + [Rich Salz] Changes between 1.0.2k and 1.0.2l [25 May 2017] @@ -7,7 +7,8 @@ Major changes between OpenSSL 1.0.2l and OpenSSL 1.0.2m [under development] - o + o bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736) + o Malformed X.509 IPAddressFamily could cause OOB read (CVE-2017-3735) Major changes between OpenSSL 1.0.2k and OpenSSL 1.0.2l [25 May 2017] |