summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2022-03-14 16:30:26 +0000
committerMatt Caswell <matt@openssl.org>2022-03-15 13:36:32 +0000
commitdb9c0d5969de809d452162e9bdc08291b78913bf (patch)
tree79bbfb62043bfb87759ac069f2a943ce87dbefde
parentaf9ca22dee50cc30e89bd2817340d00e2a174fc9 (diff)
Update CHANGES/NEWS for new release
Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org>
-rw-r--r--CHANGES.md30
-rw-r--r--NEWS.md3
2 files changed, 32 insertions, 1 deletions
diff --git a/CHANGES.md b/CHANGES.md
index b569b1c1c5..77a414020e 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -30,6 +30,36 @@ breaking changes, and mappings for the large list of deprecated functions.
### Changes between 3.0.1 and 3.0.2 [xx XXX xxxx]
+ * Fixed a bug in the BN_mod_sqrt() function that can cause it to loop forever
+ for non-prime moduli.
+
+ Internally this function is used when parsing certificates that contain
+ elliptic curve public keys in compressed form or explicit elliptic curve
+ parameters with a base point encoded in compressed form.
+
+ It is possible to trigger the infinite loop by crafting a certificate that
+ has invalid explicit curve parameters.
+
+ Since certificate parsing happens prior to verification of the certificate
+ signature, any process that parses an externally supplied certificate may thus
+ be subject to a denial of service attack. The infinite loop can also be
+ reached when parsing crafted private keys as they can contain explicit
+ elliptic curve parameters.
+
+ Thus vulnerable situations include:
+
+ - TLS clients consuming server certificates
+ - TLS servers consuming client certificates
+ - Hosting providers taking certificates or private keys from customers
+ - Certificate authorities parsing certification requests from subscribers
+ - Anything else which parses ASN.1 elliptic curve parameters
+
+ Also any other applications that use the BN_mod_sqrt() where the attacker
+ can control the parameter values are vulnerable to this DoS issue.
+ ([CVE-2022-0778])
+
+ *Tomáš Mráz*
+
* Add ciphersuites based on DHE_PSK (RFC 4279) and ECDHE_PSK (RFC 5489)
to the list of ciphersuites providing Perfect Forward Secrecy as
required by SECLEVEL >= 3.
diff --git a/NEWS.md b/NEWS.md
index ee4c9fd185..d8327ffa32 100644
--- a/NEWS.md
+++ b/NEWS.md
@@ -20,7 +20,8 @@ OpenSSL 3.0
### Major changes between OpenSSL 3.0.1 and OpenSSL 3.0.2 [under development]
- * none
+ * Fixed a bug in the BN_mod_sqrt() function that can cause it to loop forever
+ for non-prime moduli ([CVE-2022-0778])
### Major changes between OpenSSL 3.0.0 and OpenSSL 3.0.1 [14 Dec 2021]