diff options
author | Matt Caswell <matt@openssl.org> | 2018-11-20 11:52:53 +0100 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2018-11-20 12:53:44 +0100 |
commit | c1ef2852b252307d001a80409dc1ef23a3c1d874 (patch) | |
tree | 64e4bf8ec15d686d6045ee1335b87e0889c2bac5 /CHANGES | |
parent | Unix build: for mingw and cygwin, create the right location for DLLs (diff) | |
download | openssl-c1ef2852b252307d001a80409dc1ef23a3c1d874.tar.xz openssl-c1ef2852b252307d001a80409dc1ef23a3c1d874.zip |
Update CHANGES and NEWS for new release
Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/7663)
Diffstat (limited to 'CHANGES')
-rw-r--r-- | CHANGES | 22 |
1 files changed, 21 insertions, 1 deletions
@@ -55,7 +55,27 @@ list of built in objects, i.e. OIDs with names. [Richard Levitte] - Changes between 1.1.1 and 1.1.1a [xx XXX xxxx] + Changes between 1.1.1 and 1.1.1a [20 Nov 2018] + + *) Timing vulnerability in DSA signature generation + + The OpenSSL DSA signature algorithm has been shown to be vulnerable to a + timing side channel attack. An attacker could use variations in the signing + algorithm to recover the private key. + + This issue was reported to OpenSSL on 16th October 2018 by Samuel Weiser. + (CVE-2018-0734) + [Paul Dale] + + *) Timing vulnerability in ECDSA signature generation + + The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a + timing side channel attack. An attacker could use variations in the signing + algorithm to recover the private key. + + This issue was reported to OpenSSL on 25th October 2018 by Samuel Weiser. + (CVE-2018-0735) + [Paul Dale] *) Fixed the issue that RAND_add()/RAND_seed() silently discards random input if its length exceeds 4096 bytes. The limit has been raised to a buffer size |