OpenGrok
Cross Reference: check-format-commit.sh
xref
: /
src
/
crypto
/
external
/
bsd
/
openssl
/
dist
/
util
/
check-format-commit.sh
Home
|
History
|
Annotate
|
Download
|
only in
util
History log of
/src/crypto/external/bsd/openssl/dist/util/check-format-commit.sh
Revision
Date
Author
Comments
1.3
16-Apr-2025
christos
branches: 1.3.4;
merge changes between 3.0.15 and 3.0.16
1.2
16-Apr-2025
christos
Undo OpenSSL-3.0.16 changes
1.1
08-Sep-2024
christos
branches: 1.1.1;
Initial revision
1.1.1.2
16-Apr-2025
christos
Import openssl 3.0.16 (previous was 3.0.15)
### Changes between 3.0.15 and 3.0.16 [11 Feb 2025]
* Fixed timing side-channel in ECDSA signature computation.
There is a timing signal of around 300 nanoseconds when the top word of
the inverted ECDSA nonce value is zero. This can happen with significant
probability only for some of the supported elliptic curves. In particular
the NIST P-521 curve is affected. To be able to measure this leak, the
attacker process must either be located in the same physical computer or
must have a very fast network connection with low latency.
([CVE-2024-13176])
*Tom\xc3\xa1\xc5\xa1 Mr\xc3\xa1z*
* Fixed possible OOB memory access with invalid low-level GF(2^m) elliptic
curve parameters.
Use of the low-level GF(2^m) elliptic curve APIs with untrusted
explicit values for the field polynomial can lead to out-of-bounds memory
reads or writes.
Applications working with "exotic" explicit binary (GF(2^m)) curve
parameters, that make it possible to represent invalid field polynomials
with a zero constant term, via the above or similar APIs, may terminate
abruptly as a result of reading or writing outside of array bounds. Remote
code execution cannot easily be ruled out.
([CVE-2024-9143])
*Viktor Dukhovni*
1.1.1.1
08-Sep-2024
christos
import 3.0.15 (previous was 3.0.14)
### Changes between 3.0.14 and 3.0.15 [3 Sep 2024]
* Fixed possible denial of service in X.509 name checks.
Applications performing certificate name checks (e.g., TLS clients checking
server certificates) may attempt to read an invalid memory address when
comparing the expected name with an `otherName` subject alternative name of
an X.509 certificate. This may result in an exception that terminates the
application program.
([CVE-2024-6119])
*Viktor Dukhovni*
* Fixed possible buffer overread in SSL_select_next_proto().
Calling the OpenSSL API function SSL_select_next_proto with an empty
supported client protocols buffer may cause a crash or memory contents
to be sent to the peer.
([CVE-2024-5535])
*Matt Caswell*
1.3.4.2
02-Aug-2025
perseant
Sync with HEAD
1.3.4.1
16-Apr-2025
perseant
file check-format-commit.sh was added on branch perseant-exfatfs on 2025-08-02 05:19:15 +0000
Indexes created Tue Mar 03 05:31:39 UTC 2026