diff options
author | Matt Caswell <matt@openssl.org> | 2015-07-02 15:38:32 +0100 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2015-07-09 09:32:04 +0100 |
commit | 245daa2b733d66233450bab6880cd0afcddb61de (patch) | |
tree | c54d1e08fc477a8a375dde0efdf229bcdbf73f1d | |
parent | cb22d2ae5a5b6069dbf66dbcce07223ac15a16de (diff) |
Update CHANGES and NEWS for the new release
Reviewed-by: Stephen Henson <steve@openssl.org>
-rw-r--r-- | CHANGES | 13 | ||||
-rw-r--r-- | NEWS | 2 |
2 files changed, 13 insertions, 2 deletions
@@ -4,7 +4,18 @@ Changes between 1.0.1o and 1.0.1p [xx XXX xxxx] - *) + *) Alternate chains certificate forgery + + During certificate verfification, OpenSSL will attempt to find an + alternative certificate chain if the first attempt to build such a chain + fails. An error in the implementation of this logic can mean that an + attacker could cause certain checks on untrusted certificates to be + bypassed, such as the CA flag, enabling them to use a valid leaf + certificate to act as a CA and "issue" an invalid certificate. + + This issue was reported to OpenSSL by Adam Langley/David Benjamin + (Google/BoringSSL). + [Matt Caswell] Changes between 1.0.1n and 1.0.1o [12 Jun 2015] @@ -7,7 +7,7 @@ Major changes between OpenSSL 1.0.1o and OpenSSL 1.0.1p [under development] - o + o Alternate chains certificate forgery (CVE-2015-1793) Major changes between OpenSSL 1.0.1n and OpenSSL 1.0.1o [12 Jun 2015] |