[openssl-commits] [openssl] master update
Matt Caswell
matt at openssl.org
Tue Nov 20 11:54:09 UTC 2018
The branch master has been updated
via c1ef2852b252307d001a80409dc1ef23a3c1d874 (commit)
from 9694ebf753e571a55935a63b4df8016e7bd3248d (commit)
- Log -----------------------------------------------------------------
commit c1ef2852b252307d001a80409dc1ef23a3c1d874
Author: Matt Caswell <matt at openssl.org>
Date: Tue Nov 20 10:52:53 2018 +0000
Update CHANGES and NEWS for new release
Reviewed-by: Richard Levitte <levitte at openssl.org>
Reviewed-by: Nicola Tuveri <nic.tuv at gmail.com>
(Merged from https://github.com/openssl/openssl/pull/7663)
-----------------------------------------------------------------------
Summary of changes:
CHANGES | 22 +++++++++++++++++++++-
NEWS | 5 +++++
2 files changed, 26 insertions(+), 1 deletion(-)
diff --git a/CHANGES b/CHANGES
index df6e6b1..95bced8 100644
--- a/CHANGES
+++ b/CHANGES
@@ -55,7 +55,27 @@
list of built in objects, i.e. OIDs with names.
[Richard Levitte]
- Changes between 1.1.1 and 1.1.1a [xx XXX xxxx]
+ Changes between 1.1.1 and 1.1.1a [20 Nov 2018]
+
+ *) Timing vulnerability in DSA signature generation
+
+ The OpenSSL DSA signature algorithm has been shown to be vulnerable to a
+ timing side channel attack. An attacker could use variations in the signing
+ algorithm to recover the private key.
+
+ This issue was reported to OpenSSL on 16th October 2018 by Samuel Weiser.
+ (CVE-2018-0734)
+ [Paul Dale]
+
+ *) Timing vulnerability in ECDSA signature generation
+
+ The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a
+ timing side channel attack. An attacker could use variations in the signing
+ algorithm to recover the private key.
+
+ This issue was reported to OpenSSL on 25th October 2018 by Samuel Weiser.
+ (CVE-2018-0735)
+ [Paul Dale]
*) Fixed the issue that RAND_add()/RAND_seed() silently discards random input
if its length exceeds 4096 bytes. The limit has been raised to a buffer size
diff --git a/NEWS b/NEWS
index 56aab21..df16b78 100644
--- a/NEWS
+++ b/NEWS
@@ -10,6 +10,11 @@
o Added EVP_MAC, an EVP layer MAC API, and a generic EVP_PKEY to EVP_MAC
bridge.
+ Major changes between OpenSSL 1.1.1 and OpenSSL 1.1.1a [20 Nov 2018]
+
+ o Timing vulnerability in DSA signature generation (CVE-2018-0734)
+ o Timing vulnerability in ECDSA signature generation (CVE-2018-0735)
+
Major changes between OpenSSL 1.1.0i and OpenSSL 1.1.1 [11 Sep 2018]
o Support for TLSv1.3 added (see https://wiki.openssl.org/index.php/TLS1.3
More information about the openssl-commits
mailing list