OpenSSL v1.0.0.l Release Notes

Release Date: 2014-06-05 // almost 10 years ago
    • Fix for SSL/TLS MITM flaw. An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers.

    Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for discovering and researching this issue. [CVE-2014-0224][]

    KIKUCHI Masashi, Steve Henson

    • Fix DTLS recursion flaw. By sending an invalid DTLS handshake to an OpenSSL DTLS client the code can be made to recurse eventually crashing in a DoS attack.

    Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue. [CVE-2014-0221][]

    Imre Rad, Steve Henson

    • Fix DTLS invalid fragment vulnerability. A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server.

    Thanks to Jüri Aedla for reporting this issue. [CVE-2014-0195][]

    Jüri Aedla, Steve Henson

    • Fix bug in TLS code where clients enable anonymous ECDH ciphersuites are subject to a denial of service attack.

    Thanks to Felix Gröbert and Ivan Fratric at Google for discovering this issue. [CVE-2014-3470][]

    Felix Gröbert, Ivan Fratric, Steve Henson

    • Harmonize version and its documentation. -f flag is used to display compilation flags.

    mancha [email protected]

    • Fix eckey_priv_encode so it immediately returns an error upon a failure in i2d_ECPrivateKey.

    mancha [email protected]

    • Fix some double frees. These are not thought to be exploitable.

    mancha [email protected]

    • Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" by Yuval Yarom and Naomi Benger. Details can be obtained from: http://eprint.iacr.org/2014/140

    Thanks to Yuval Yarom and Naomi Benger for discovering this flaw and to Yuval Yarom for supplying a fix [CVE-2014-0076][]

    Yuval Yarom and Naomi Benger