|
7 | 7 | https://github.com/openssl/openssl/commits/ and pick the appropriate
|
8 | 8 | release branch.
|
9 | 9 |
|
| 10 | + Changes between 1.1.1i and 1.1.1j [16 Feb 2021] |
| 11 | + |
| 12 | + *) Fixed the X509_issuer_and_serial_hash() function. It attempts to |
| 13 | + create a unique hash value based on the issuer and serial number data |
| 14 | + contained within an X509 certificate. However it was failing to correctly |
| 15 | + handle any errors that may occur while parsing the issuer field (which might |
| 16 | + occur if the issuer field is maliciously constructed). This may subsequently |
| 17 | + result in a NULL pointer deref and a crash leading to a potential denial of |
| 18 | + service attack. |
| 19 | + (CVE-2021-23841) |
| 20 | + [Matt Caswell] |
| 21 | + |
| 22 | + *) Fixed the RSA_padding_check_SSLv23() function and the RSA_SSLV23_PADDING |
| 23 | + padding mode to correctly check for rollback attacks. This is considered a |
| 24 | + bug in OpenSSL 1.1.1 because it does not support SSLv2. In 1.0.2 this is |
| 25 | + CVE-2021-23839. |
| 26 | + [Matt Caswell] |
| 27 | + |
| 28 | + *) Fixed the EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate |
| 29 | + functions. Previously they could overflow the output length argument in some |
| 30 | + cases where the input length is close to the maximum permissable length for |
| 31 | + an integer on the platform. In such cases the return value from the function |
| 32 | + call would be 1 (indicating success), but the output length value would be |
| 33 | + negative. This could cause applications to behave incorrectly or crash. |
| 34 | + (CVE-2021-23840) |
| 35 | + [Matt Caswell] |
| 36 | + |
| 37 | + *) Fixed SRP_Calc_client_key so that it runs in constant time. The previous |
| 38 | + implementation called BN_mod_exp without setting BN_FLG_CONSTTIME. This |
| 39 | + could be exploited in a side channel attack to recover the password. Since |
| 40 | + the attack is local host only this is outside of the current OpenSSL |
| 41 | + threat model and therefore no CVE is assigned. |
| 42 | + |
| 43 | + Thanks to Mohammed Sabt and Daniel De Almeida Braga for reporting this |
| 44 | + issue. |
| 45 | + [Matt Caswell] |
| 46 | + |
10 | 47 | Changes between 1.1.1h and 1.1.1i [8 Dec 2020]
|
11 | 48 |
|
12 | 49 | *) Fixed NULL pointer deref in the GENERAL_NAME_cmp function
|
|
52 | 89 | types. The same applies with the corresponding "min_protocol" and
|
53 | 90 | "max_protocol" command-line switches, in case some application uses both TLS
|
54 | 91 | and DTLS.
|
55 |
| - |
| 92 | + |
56 | 93 | SSL_CTX instances that are created for a fixed protocol version (e.g.
|
57 | 94 | TLSv1_server_method()) also silently ignore version bounds. Previously
|
58 | 95 | attempts to apply bounds to these protocol versions would result in an
|
|
0 commit comments