summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2015-07-02 15:38:32 +0100
committerMatt Caswell <matt@openssl.org>2015-07-09 09:32:04 +0100
commit245daa2b733d66233450bab6880cd0afcddb61de (patch)
treec54d1e08fc477a8a375dde0efdf229bcdbf73f1d
parentcb22d2ae5a5b6069dbf66dbcce07223ac15a16de (diff)
Update CHANGES and NEWS for the new release
Reviewed-by: Stephen Henson <steve@openssl.org>
-rw-r--r--CHANGES13
-rw-r--r--NEWS2
2 files changed, 13 insertions, 2 deletions
diff --git a/CHANGES b/CHANGES
index af27f3fdf5..7d4d2debfd 100644
--- a/CHANGES
+++ b/CHANGES
@@ -4,7 +4,18 @@
Changes between 1.0.1o and 1.0.1p [xx XXX xxxx]
- *)
+ *) Alternate chains certificate forgery
+
+ During certificate verfification, OpenSSL will attempt to find an
+ alternative certificate chain if the first attempt to build such a chain
+ fails. An error in the implementation of this logic can mean that an
+ attacker could cause certain checks on untrusted certificates to be
+ bypassed, such as the CA flag, enabling them to use a valid leaf
+ certificate to act as a CA and "issue" an invalid certificate.
+
+ This issue was reported to OpenSSL by Adam Langley/David Benjamin
+ (Google/BoringSSL).
+ [Matt Caswell]
Changes between 1.0.1n and 1.0.1o [12 Jun 2015]
diff --git a/NEWS b/NEWS
index 1d81d4ccf3..c736b24730 100644
--- a/NEWS
+++ b/NEWS
@@ -7,7 +7,7 @@
Major changes between OpenSSL 1.0.1o and OpenSSL 1.0.1p [under development]
- o
+ o Alternate chains certificate forgery (CVE-2015-1793)
Major changes between OpenSSL 1.0.1n and OpenSSL 1.0.1o [12 Jun 2015]