Skip to content
This repository was archived by the owner on Aug 24, 2025. It is now read-only.

Commit 825dbd0

Browse files
committed
Updates to CHANGES and NEWS for the new release
Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from openssl#6950)
1 parent cc08075 commit 825dbd0

File tree

2 files changed

+26
-1
lines changed

2 files changed

+26
-1
lines changed

CHANGES

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,30 @@
99

1010
Changes between 1.1.0h and 1.1.0i [xx XXX xxxx]
1111

12+
*) Client DoS due to large DH parameter
13+
14+
During key agreement in a TLS handshake using a DH(E) based ciphersuite a
15+
malicious server can send a very large prime value to the client. This will
16+
cause the client to spend an unreasonably long period of time generating a
17+
key for this prime resulting in a hang until the client has finished. This
18+
could be exploited in a Denial Of Service attack.
19+
20+
This issue was reported to OpenSSL on 5th June 2018 by Guido Vranken
21+
(CVE-2018-0732)
22+
[Guido Vranken]
23+
24+
*) Cache timing vulnerability in RSA Key Generation
25+
26+
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to
27+
a cache timing side channel attack. An attacker with sufficient access to
28+
mount cache timing attacks during the RSA key generation process could
29+
recover the private key.
30+
31+
This issue was reported to OpenSSL on 4th April 2018 by Alejandro Cabrera
32+
Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis Manuel Alvarez Tapia.
33+
(CVE-2018-0737)
34+
[Billy Brumley]
35+
1236
*) Make EVP_PKEY_asn1_new() a bit stricter about its input. A NULL pem_str
1337
parameter is no longer accepted, as it leads to a corrupt table. NULL
1438
pem_str is reserved for alias entries only.

NEWS

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,8 @@
77

88
Major changes between OpenSSL 1.1.0h and OpenSSL 1.1.0i [under development]
99

10-
o
10+
o Client DoS due to large DH parameter (CVE-2018-0732)
11+
o Cache timing vulnerability in RSA Key Generation (CVE-2018-0737)
1112

1213
Major changes between OpenSSL 1.1.0g and OpenSSL 1.1.0h [27 Mar 2018]
1314

0 commit comments

Comments
 (0)