[openssl] master update
matthias.st.pierre at ncp-e.com
matthias.st.pierre at ncp-e.com
Thu Mar 19 00:06:35 UTC 2020
The branch master has been updated
via 8658feddea6aef5cf5cbb1cfbf6b1817fa432051 (commit)
from ad090d57e223f3dbac43e724ed9be7ebf5629fcd (commit)
- Log -----------------------------------------------------------------
commit 8658feddea6aef5cf5cbb1cfbf6b1817fa432051
Author: Dr. Matthias St. Pierre <Matthias.St.Pierre at ncp-e.com>
Date: Tue Mar 17 17:25:51 2020 +0100
Update CHANGES and NEWS for 1.1.1e release
Reviewed-by: Matt Caswell <matt at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/11346)
-----------------------------------------------------------------------
Summary of changes:
CHANGES.md | 28 +++++++++++++++++++++++++++-
NEWS.md | 10 ++++++++++
2 files changed, 37 insertions(+), 1 deletion(-)
diff --git a/CHANGES.md b/CHANGES.md
index c552e9a0a8..d2aaec9fbe 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -938,7 +938,33 @@ OpenSSL 3.0
OpenSSL 1.1.1
-------------
-### Changes between 1.1.1d and 1.1.1e [xx XXX xxxx] ###
+### Changes between 1.1.1e and 1.1.1f [xx XXX xxxx] ###
+
+
+### Changes between 1.1.1d and 1.1.1e [17 Mar 2020] ###
+
+ * Properly detect EOF while reading in libssl. Previously if we hit an EOF
+ while reading in libssl then we would report an error back to the
+ application (SSL_ERROR_SYSCALL) but errno would be 0. We now add
+ an error to the stack (which means we instead return SSL_ERROR_SSL) and
+ therefore give a hint as to what went wrong.
+
+ *Matt Caswell*
+
+ * Check that ed25519 and ed448 are allowed by the security level. Previously
+ signature algorithms not using an MD were not being checked that they were
+ allowed by the security level.
+
+ *Kurt Roeckx*
+
+ * Fixed SSL_get_servername() behaviour. The behaviour of SSL_get_servername()
+ was not quite right. The behaviour was not consistent between resumption
+ and normal handshakes, and also not quite consistent with historical
+ behaviour. The behaviour in various scenarios has been clarified and
+ it has been updated to make it match historical behaviour as closely as
+ possible.
+
+ *Matt Caswell*
* *[VMS only]* The header files that the VMS compilers include automatically,
`__DECC_INCLUDE_PROLOGUE.H` and `__DECC_INCLUDE_EPILOGUE.H`, use pragmas
diff --git a/NEWS.md b/NEWS.md
index 434f306e11..10a38b2aaf 100644
--- a/NEWS.md
+++ b/NEWS.md
@@ -57,6 +57,15 @@ OpenSSL 3.0
OpenSSL 1.1.1
-------------
+### Major changes between OpenSSL 1.1.1e and OpenSSL 1.1.1f [under development] ###
+
+ *
+
+### Major changes between OpenSSL 1.1.1d and OpenSSL 1.1.1e [17 Mar 2020] ###
+
+ * Fixed an overflow bug in the x64_64 Montgomery squaring procedure
+ used in exponentiation with 512-bit moduli ([CVE-2019-1551][])
+
### Major changes between OpenSSL 1.1.1c and OpenSSL 1.1.1d [10 Sep 2019] ###
* Fixed a fork protection issue ([CVE-2019-1549][])
@@ -1295,6 +1304,7 @@ OpenSSL 0.9.x
[CVE-2019-1563]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1563
[CVE-2019-1559]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1559
[CVE-2019-1552]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1552
+[CVE-2019-1551]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1551
[CVE-2019-1549]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1549
[CVE-2019-1547]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1547
[CVE-2019-1543]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1543
More information about the openssl-commits
mailing list