diff options
author | Tomas Mraz <tomas@openssl.org> | 2023-09-08 15:28:45 +0200 |
---|---|---|
committer | Tomas Mraz <tomas@openssl.org> | 2023-09-11 10:55:51 +0200 |
commit | 0be7510f49e498532708fd03628fc3fc62ee7875 (patch) | |
tree | f90bca5b5408a20314834ab18cd792785c9dc312 /CHANGES.md | |
parent | 02f84b02e889fce0033174238cbd0b653ee9af2c (diff) |
Add CVE-2023-4807 fix to CHANGES.md and NEWS.md
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Hugo Landau <hlandau@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/22033)
Diffstat (limited to 'CHANGES.md')
-rw-r--r-- | CHANGES.md | 23 |
1 files changed, 22 insertions, 1 deletions
diff --git a/CHANGES.md b/CHANGES.md index c187fe9e05..f0b6898511 100644 --- a/CHANGES.md +++ b/CHANGES.md @@ -457,7 +457,27 @@ OpenSSL 3.1 ### Changes between 3.1.2 and 3.1.3 [xx XXX xxxx] - * none yet + * Fix POLY1305 MAC implementation corrupting XMM registers on Windows. + + The POLY1305 MAC (message authentication code) implementation in OpenSSL + does not save the contents of non-volatile XMM registers on Windows 64 + platform when calculating the MAC of data larger than 64 bytes. Before + returning to the caller all the XMM registers are set to zero rather than + restoring their previous content. The vulnerable code is used only on newer + x86_64 processors supporting the AVX512-IFMA instructions. + + The consequences of this kind of internal application state corruption can + be various - from no consequences, if the calling application does not + depend on the contents of non-volatile XMM registers at all, to the worst + consequences, where the attacker could get complete control of the + application process. However given the contents of the registers are just + zeroized so the attacker cannot put arbitrary values inside, the most likely + consequence, if any, would be an incorrect result of some application + dependent calculations or a crash leading to a denial of service. + + ([CVE-2023-4807]) + + *Bernd Edlinger* ### Changes between 3.1.1 and 3.1.2 [1 Aug 2023] @@ -20253,6 +20273,7 @@ ndif <!-- Links --> +[CVE-2023-4807]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-4807 [CVE-2023-3817]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3817 [CVE-2023-3446]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3446 [CVE-2023-2975]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2975 |