Skip to content

Commit

Permalink
Update CHANGES.md and NEWS.md for new release
Browse files Browse the repository at this point in the history
Release: yes
  • Loading branch information
mattcaswell committed Jan 29, 2024
1 parent a4ea3df commit 77a47fc
Show file tree
Hide file tree
Showing 2 changed files with 41 additions and 23 deletions.
50 changes: 34 additions & 16 deletions CHANGES.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,25 @@ OpenSSL 3.2

### Changes between 3.2.0 and 3.2.1 [xx XXX xxxx]

* A file in PKCS12 format can contain certificates and keys and may come from
an untrusted source. The PKCS12 specification allows certain fields to be
NULL, but OpenSSL does not correctly check for this case. This can lead to a
NULL pointer dereference that results in OpenSSL crashing. If an application
processes PKCS12 files from an untrusted source using the OpenSSL APIs then
that application will be vulnerable to this issue.

OpenSSL APIs that are vulnerable to this are: PKCS12_parse(),
PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes()
and PKCS12_newpass().

We have also fixed a similar issue in SMIME_write_PKCS7(). However since this
function is related to writing data we do not consider it security
significant.

([CVE-2024-0727])

*Matt Caswell*

* When function EVP_PKEY_public_check() is called on RSA public keys,
a computation is done to confirm that the RSA modulus, n, is composite.
For valid RSA keys, n is a product of two or more large primes and this
Expand Down Expand Up @@ -75,6 +94,20 @@ OpenSSL 3.2

*Rohan McLure*

* Fix excessive time spent in DH check / generation with large Q parameter
value.

Applications that use the functions DH_generate_key() to generate an
X9.42 DH key may experience long delays. Likewise, applications that use
DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check()
to check an X9.42 DH key or X9.42 DH parameters may experience long delays.
Where the key or parameters that are being checked have been obtained from
an untrusted source this may lead to a Denial of Service.

([CVE-2023-5678])

*Richard Levitte*

* Disable building QUIC server utility when OpenSSL is configured with
`no-apps`.

Expand Down Expand Up @@ -532,22 +565,6 @@ OpenSSL 3.2
OpenSSL 3.1
-----------

### Changes between 3.1.4 and 3.1.5 [xx XXX xxxx]

* Fix excessive time spent in DH check / generation with large Q parameter
value.

Applications that use the functions DH_generate_key() to generate an
X9.42 DH key may experience long delays. Likewise, applications that use
DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check()
to check an X9.42 DH key or X9.42 DH parameters may experience long delays.
Where the key or parameters that are being checked have been obtained from
an untrusted source this may lead to a Denial of Service.

([CVE-2023-5678])

*Richard Levitte*

### Changes between 3.1.3 and 3.1.4 [24 Oct 2023]

* Fix incorrect key and IV resizing issues when calling EVP_EncryptInit_ex2(),
Expand Down Expand Up @@ -20374,6 +20391,7 @@ ndif

<!-- Links -->

[CVE-2024-0727]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-0727
[CVE-2023-6237]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-6237
[CVE-2023-6129]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-6129
[CVE-2023-5678]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-5678
Expand Down
14 changes: 7 additions & 7 deletions NEWS.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,12 +22,16 @@ OpenSSL 3.2

### Major changes between OpenSSL 3.2.0 and OpenSSL 3.2.1 [under development]

* Fixed Excessive time spent checking invalid RSA public keys
* Fixed PKCS12 Decoding crashes
([CVE-2024-0727])
* Fixed excessive time spent checking invalid RSA public keys
([CVE-2023-6237])

* Fixed POLY1305 MAC implementation corrupting vector registers on PowerPC
CPUs which support PowerISA 2.07
([CVE-2023-6129])
* Fixed excessive time spent in DH check / generation with large Q parameter
value
[(CVE-2023-5678)]

### Major changes between OpenSSL 3.1 and OpenSSL 3.2.0 [23 Nov 2023]

Expand Down Expand Up @@ -116,11 +120,6 @@ tracker][issue tracker].
OpenSSL 3.1
-----------

### Major changes between OpenSSL 3.1.4 and OpenSSL 3.1.5 [under development]

* Fix excessive time spent in DH check / generation with large Q parameter
value ([CVE-2023-5678])

### Major changes between OpenSSL 3.1.3 and OpenSSL 3.1.4 [24 Oct 2023]

* Mitigate incorrect resize handling for symmetric cipher keys and IVs.
Expand Down Expand Up @@ -1576,6 +1575,7 @@ OpenSSL 0.9.x

<!-- Links -->

[CVE-2024-0727]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-0727
[CVE-2023-6237]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-6237
[CVE-2023-6129]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-6129
[CVE-2023-5678]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-5678
Expand Down

0 comments on commit 77a47fc

Please sign in to comment.