diff options
author | Mike DePaulo <mikedep333@gmail.com> | 2015-07-10 08:13:00 -0400 |
---|---|---|
committer | Mike DePaulo <mikedep333@gmail.com> | 2015-07-10 08:13:00 -0400 |
commit | 1f6433e7473a14bf4263b618d3f0c1e17196a267 (patch) | |
tree | 9e809df23efaebf611765948726ff76805426093 /openssl/CHANGES | |
parent | ddb34d947fe45fcc4d2a8da284e7fa0c001bb7d3 (diff) | |
download | vcxsrv-1f6433e7473a14bf4263b618d3f0c1e17196a267.tar.gz vcxsrv-1f6433e7473a14bf4263b618d3f0c1e17196a267.tar.bz2 vcxsrv-1f6433e7473a14bf4263b618d3f0c1e17196a267.zip |
Update openssl: 1.0.1o -> 1.0.1prelease/external-1.15.2.x
Diffstat (limited to 'openssl/CHANGES')
-rw-r--r-- | openssl/CHANGES | 15 |
1 files changed, 15 insertions, 0 deletions
diff --git a/openssl/CHANGES b/openssl/CHANGES index 759b2a7bb..2e888f7b0 100644 --- a/openssl/CHANGES +++ b/openssl/CHANGES @@ -2,6 +2,21 @@ OpenSSL CHANGES _______________ + Changes between 1.0.1o and 1.0.1p [9 Jul 2015] + + *) Alternate chains certificate forgery + + During certificate verfification, OpenSSL will attempt to find an + alternative certificate chain if the first attempt to build such a chain + fails. An error in the implementation of this logic can mean that an + attacker could cause certain checks on untrusted certificates to be + bypassed, such as the CA flag, enabling them to use a valid leaf + certificate to act as a CA and "issue" an invalid certificate. + + This issue was reported to OpenSSL by Adam Langley/David Benjamin + (Google/BoringSSL). + [Matt Caswell] + Changes between 1.0.1n and 1.0.1o [12 Jun 2015] *) Fix HMAC ABI incompatibility. The previous version introduced an ABI |