mirror of
https://github.com/QuasarApp/openssl.git
synced 2025-04-29 19:24:37 +00:00
Updates CHANGES and NEWS for new release
Reviewed-by: Richard Levitte <levitte@openssl.org>
This commit is contained in:
parent
41b4280772
commit
39c136cc53
77
CHANGES
77
CHANGES
@ -2,7 +2,7 @@
|
|||||||
OpenSSL CHANGES
|
OpenSSL CHANGES
|
||||||
_______________
|
_______________
|
||||||
|
|
||||||
Changes between 1.1.0 and 1.1.1 [xx XXX xxxx]
|
Changes between 1.1.0a and 1.1.1 [xx XXX xxxx]
|
||||||
|
|
||||||
*)
|
*)
|
||||||
|
|
||||||
@ -11,6 +11,81 @@
|
|||||||
https://www.akkadia.org/drepper/SHA-crypt.txt
|
https://www.akkadia.org/drepper/SHA-crypt.txt
|
||||||
[Richard Levitte]
|
[Richard Levitte]
|
||||||
|
|
||||||
|
Changes between 1.1.0 and 1.1.0a [22 Sep 2016]
|
||||||
|
|
||||||
|
*) OCSP Status Request extension unbounded memory growth
|
||||||
|
|
||||||
|
A malicious client can send an excessively large OCSP Status Request
|
||||||
|
extension. If that client continually requests renegotiation, sending a
|
||||||
|
large OCSP Status Request extension each time, then there will be unbounded
|
||||||
|
memory growth on the server. This will eventually lead to a Denial Of
|
||||||
|
Service attack through memory exhaustion. Servers with a default
|
||||||
|
configuration are vulnerable even if they do not support OCSP. Builds using
|
||||||
|
the "no-ocsp" build time option are not affected.
|
||||||
|
|
||||||
|
This issue was reported to OpenSSL by Shi Lei (Gear Team, Qihoo 360 Inc.)
|
||||||
|
(CVE-2016-6304)
|
||||||
|
[Matt Caswell]
|
||||||
|
|
||||||
|
*) SSL_peek() hang on empty record
|
||||||
|
|
||||||
|
OpenSSL 1.1.0 SSL/TLS will hang during a call to SSL_peek() if the peer
|
||||||
|
sends an empty record. This could be exploited by a malicious peer in a
|
||||||
|
Denial Of Service attack.
|
||||||
|
|
||||||
|
This issue was reported to OpenSSL by Alex Gaynor.
|
||||||
|
(CVE-2016-6305)
|
||||||
|
[Matt Caswell]
|
||||||
|
|
||||||
|
*) Excessive allocation of memory in tls_get_message_header() and
|
||||||
|
dtls1_preprocess_fragment()
|
||||||
|
|
||||||
|
A (D)TLS message includes 3 bytes for its length in the header for the
|
||||||
|
message. This would allow for messages up to 16Mb in length. Messages of
|
||||||
|
this length are excessive and OpenSSL includes a check to ensure that a
|
||||||
|
peer is sending reasonably sized messages in order to avoid too much memory
|
||||||
|
being consumed to service a connection. A flaw in the logic of version
|
||||||
|
1.1.0 means that memory for the message is allocated too early, prior to
|
||||||
|
the excessive message length check. Due to way memory is allocated in
|
||||||
|
OpenSSL this could mean an attacker could force up to 21Mb to be allocated
|
||||||
|
to service a connection. This could lead to a Denial of Service through
|
||||||
|
memory exhaustion. However, the excessive message length check still takes
|
||||||
|
place, and this would cause the connection to immediately fail. Assuming
|
||||||
|
that the application calls SSL_free() on the failed conneciton in a timely
|
||||||
|
manner then the 21Mb of allocated memory will then be immediately freed
|
||||||
|
again. Therefore the excessive memory allocation will be transitory in
|
||||||
|
nature. This then means that there is only a security impact if:
|
||||||
|
|
||||||
|
1) The application does not call SSL_free() in a timely manner in the event
|
||||||
|
that the connection fails
|
||||||
|
or
|
||||||
|
2) The application is working in a constrained environment where there is
|
||||||
|
very little free memory
|
||||||
|
or
|
||||||
|
3) The attacker initiates multiple connection attempts such that there are
|
||||||
|
multiple connections in a state where memory has been allocated for the
|
||||||
|
connection; SSL_free() has not yet been called; and there is insufficient
|
||||||
|
memory to service the multiple requests.
|
||||||
|
|
||||||
|
Except in the instance of (1) above any Denial Of Service is likely to be
|
||||||
|
transitory because as soon as the connection fails the memory is
|
||||||
|
subsequently freed again in the SSL_free() call. However there is an
|
||||||
|
increased risk during this period of application crashes due to the lack of
|
||||||
|
memory - which would then mean a more serious Denial of Service.
|
||||||
|
|
||||||
|
This issue was reported to OpenSSL by Shi Lei (Gear Team, Qihoo 360 Inc.)
|
||||||
|
(CVE-2016-6307 and CVE-2016-6308)
|
||||||
|
[Matt Caswell]
|
||||||
|
|
||||||
|
*) solaris-x86-cc, i.e. 32-bit configuration with vendor compiler,
|
||||||
|
had to be removed. Primary reason is that vendor assembler can't
|
||||||
|
assemble our modules with -KPIC flag. As result it, assembly
|
||||||
|
support, was not even available as option. But its lack means
|
||||||
|
lack of side-channel resistant code, which is incompatible with
|
||||||
|
security by todays standards. Fortunately gcc is readily available
|
||||||
|
prepackaged option, which we firmly point at...
|
||||||
|
[Andy Polyakov]
|
||||||
|
|
||||||
Changes between 1.0.2h and 1.1.0 [25 Aug 2016]
|
Changes between 1.0.2h and 1.1.0 [25 Aug 2016]
|
||||||
|
|
||||||
*) Windows command-line tool supports UTF-8 opt-in option for arguments
|
*) Windows command-line tool supports UTF-8 opt-in option for arguments
|
||||||
|
11
NEWS
11
NEWS
@ -5,10 +5,19 @@
|
|||||||
This file gives a brief overview of the major changes between each OpenSSL
|
This file gives a brief overview of the major changes between each OpenSSL
|
||||||
release. For more details please read the CHANGES file.
|
release. For more details please read the CHANGES file.
|
||||||
|
|
||||||
Major changes between OpenSSL 1.1.0 and OpenSSL 1.1.1 [under development]
|
Major changes between OpenSSL 1.1.0a and OpenSSL 1.1.1 [under development]
|
||||||
|
|
||||||
o
|
o
|
||||||
|
|
||||||
|
Major changes between OpenSSL 1.1.0 and OpenSSL 1.1.0a [22 Sep 2016]
|
||||||
|
|
||||||
|
o OCSP Status Request extension unbounded memory growth (CVE-2016-6304)
|
||||||
|
o SSL_peek() hang on empty record (CVE-2016-6305)
|
||||||
|
o Excessive allocation of memory in tls_get_message_header()
|
||||||
|
(CVE-2016-6307)
|
||||||
|
o Excessive allocation of memory in dtls1_preprocess_fragment()
|
||||||
|
(CVE-2016-6308)
|
||||||
|
|
||||||
Major changes between OpenSSL 1.0.2h and OpenSSL 1.1.0 [25 Aug 2016]
|
Major changes between OpenSSL 1.0.2h and OpenSSL 1.1.0 [25 Aug 2016]
|
||||||
|
|
||||||
o Copyright text was shrunk to a boilerplate that points to the license
|
o Copyright text was shrunk to a boilerplate that points to the license
|
||||||
|
Loading…
x
Reference in New Issue
Block a user