summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2014-08-06 21:28:59 +0100
committerMatt Caswell <matt@openssl.org>2014-08-06 22:02:00 +0100
commit9fcaaef34f4125403c25442b1c0686529f20d2aa (patch)
treec7ae2fc01e958f095cd6233c03a857226d1f8a4b
parentb9a73f5481fb8d5aac535622759cb0f632f39914 (diff)
Updates to CHANGES and NEWS
Reviewed-by: Kurt Roeckx <kurt@openssl.org>
-rw-r--r--CHANGES40
-rw-r--r--NEWS6
2 files changed, 45 insertions, 1 deletions
diff --git a/CHANGES b/CHANGES
index fbbf792708..9a04d50a67 100644
--- a/CHANGES
+++ b/CHANGES
@@ -4,6 +4,46 @@
Changes between 0.9.8za and 0.9.8zb [xx XXX xxxx]
+ *) OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject
+ to a denial of service attack. A malicious server can crash the client
+ with a null pointer dereference (read) by specifying an anonymous (EC)DH
+ ciphersuite and sending carefully crafted handshake messages.
+
+ Thanks to Felix Gröbert (Google) for discovering and researching this
+ issue.
+ (CVE-2014-3510)
+ [Emilia Käsper]
+
+ *) By sending carefully crafted DTLS packets an attacker could cause openssl
+ to leak memory. This can be exploited through a Denial of Service attack.
+ Thanks to Adam Langley for discovering and researching this issue.
+ (CVE-2014-3507)
+ [Adam Langley]
+
+ *) An attacker can force openssl to consume large amounts of memory whilst
+ processing DTLS handshake messages. This can be exploited through a
+ Denial of Service attack.
+ Thanks to Adam Langley for discovering and researching this issue.
+ (CVE-2014-3506)
+ [Adam Langley]
+
+ *) An attacker can force an error condition which causes openssl to crash
+ whilst processing DTLS packets due to memory being freed twice. This
+ can be exploited through a Denial of Service attack.
+ Thanks to Adam Langley and Wan-Teh Chang for discovering and researching
+ this issue.
+ (CVE-2014-3505)
+ [Adam Langley]
+
+ *) A flaw in OBJ_obj2txt may cause pretty printing functions such as
+ X509_name_oneline, X509_name_print_ex et al. to leak some information
+ from the stack. Applications may be affected if they echo pretty printing
+ output to the attacker.
+
+ Thanks to Ivan Fratric (Google) for discovering this issue.
+ (CVE-2014-3508)
+ [Emilia Käsper, and Steve Henson]
+
*) Fix ec_GFp_simple_points_make_affine (thus, EC_POINTs_mul etc.)
for corner cases. (Certain input points at infinity could lead to
bogus results, with non-infinity inputs mapped to infinity too.)
diff --git a/NEWS b/NEWS
index 85dc40d023..5b30561c4c 100644
--- a/NEWS
+++ b/NEWS
@@ -7,7 +7,11 @@
Major changes between OpenSSL 0.9.8za and OpenSSL 0.9.8zb [under development]:
- o
+ o Fix for CVE-2014-3510
+ o Fix for CVE-2014-3507
+ o Fix for CVE-2014-3506
+ o Fix for CVE-2014-3505
+ o Fix for CVE-2014-3508
Known issues in OpenSSL 0.9.8za: