From 0b9e82763f1e00abb4217b714be976d978829976 Mon Sep 17 00:00:00 2001 From: Emilia Kasper Date: Thu, 20 Nov 2014 12:20:02 +0100 Subject: [PATCH] Clean up CHANGES Reviewed-by: Matt Caswell (cherry picked from commit 31832e8ff1a3e731ea9fab41aef071a12709cf33) Conflicts: CHANGES --- CHANGES | 18 +----------------- 1 file changed, 1 insertion(+), 17 deletions(-) diff --git a/CHANGES b/CHANGES index a26cb3993a..66c08e5b75 100644 --- a/CHANGES +++ b/CHANGES @@ -2,7 +2,7 @@ OpenSSL CHANGES _______________ - Changes between 1.0.1j and 1.0.2 [xx XXX xxxx] + Changes between 1.0.1k and 1.0.2 [xx XXX xxxx] *) SRTP Memory Leak. @@ -43,22 +43,6 @@ (CVE-2014-3566) [Adam Langley, Bodo Moeller] - *) Tighten handling of the ChangeCipherSpec (CCS) message: reject - early CCS messages during renegotiation. (Note that because - renegotiation is encrypted, this early CCS was not exploitable.) - [Emilia Käsper] - - *) Tighten client-side session ticket handling during renegotiation: - ensure that the client only accepts a session ticket if the server sends - the extension anew in the ServerHello. Previously, a TLS client would - reuse the old extension state and thus accept a session ticket if one was - announced in the initial ServerHello. - - Similarly, ensure that the client requires a session ticket if one - was advertised in the ServerHello. Previously, a TLS client would - ignore a missing NewSessionTicket message. - [Emilia Käsper] - *) Accelerated NIST P-256 elliptic curve implementation for x86_64 (other platforms pending). [Shay Gueron & Vlad Krasnov (Intel Corp), Andy Polyakov] -- 2.39.5