summaryrefslogtreecommitdiffstats
path: root/CHANGES.md
diff options
context:
space:
mode:
authorTomas Mraz <tomas@openssl.org>2023-07-25 15:35:34 +0200
committerTodd Short <todd.short@me.com>2023-07-27 09:54:28 -0400
commitfb54f415b9981adebb03997304ac77d4d0cc520a (patch)
tree234cf9e9a7cf8d51bb108db78883ab1190da040d /CHANGES.md
parent1478ffad3f123550ec1014642d5c880dfbe270ef (diff)
Add CHANGES.md and NEWS.md entries for CVE-2023-3817
Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Todd Short <todd.short@me.com> (Merged from https://github.com/openssl/openssl/pull/21550) (cherry picked from commit 4b29762802c05fa871f0e1efcf804e86db0ddaa2)
Diffstat (limited to 'CHANGES.md')
-rw-r--r--CHANGES.md22
1 files changed, 20 insertions, 2 deletions
diff --git a/CHANGES.md b/CHANGES.md
index 3a716ee8e2..fb3959f177 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -24,7 +24,24 @@ OpenSSL 3.1
### Changes between 3.1.1 and 3.1.2 [xx XXX xxxx]
- * Fix DH_check() excessive time with over sized modulus
+ * Fix excessive time spent checking DH q parameter value.
+
+ The function DH_check() performs various checks on DH parameters. After
+ fixing CVE-2023-3446 it was discovered that a large q parameter value can
+ also trigger an overly long computation during some of these checks.
+ A correct q value, if present, cannot be larger than the modulus p
+ parameter, thus it is unnecessary to perform these checks if q is larger
+ than p.
+
+ If DH_check() is called with such q parameter value,
+ DH_CHECK_INVALID_Q_VALUE return flag is set and the computationally
+ intensive checks are skipped.
+
+ ([CVE-2023-3817])
+
+ *Tomáš Mráz*
+
+ * Fix DH_check() excessive time with over sized modulus.
The function DH_check() performs various checks on DH parameters. One of
those checks confirms that the modulus ("p" parameter) is not too large.
@@ -61,7 +78,7 @@ OpenSSL 3.1
has to skip calls to `EVP_DecryptUpdate()` for empty associated data
entries.
- *Tomas Mraz*
+ *Tomáš Mráz*
* When building with the `enable-fips` option and using the resulting
FIPS provider, TLS 1.2 will, by default, mandate the use of an extended
@@ -19815,6 +19832,7 @@ ndif
<!-- Links -->
+[CVE-2023-3817]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3817
[CVE-2023-3446]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3446
[CVE-2023-2975]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2975
[RFC 2578 (STD 58), section 3.5]: https://datatracker.ietf.org/doc/html/rfc2578#section-3.5