summaryrefslogtreecommitdiffstats
path: root/CHANGES.md
diff options
context:
space:
mode:
authorTomas Mraz <tomas@openssl.org>2023-09-08 15:28:45 +0200
committerTomas Mraz <tomas@openssl.org>2023-09-11 10:55:51 +0200
commit0be7510f49e498532708fd03628fc3fc62ee7875 (patch)
treef90bca5b5408a20314834ab18cd792785c9dc312 /CHANGES.md
parent02f84b02e889fce0033174238cbd0b653ee9af2c (diff)
Add CVE-2023-4807 fix to CHANGES.md and NEWS.md
Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22033)
Diffstat (limited to 'CHANGES.md')
-rw-r--r--CHANGES.md23
1 files changed, 22 insertions, 1 deletions
diff --git a/CHANGES.md b/CHANGES.md
index c187fe9e05..f0b6898511 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -457,7 +457,27 @@ OpenSSL 3.1
### Changes between 3.1.2 and 3.1.3 [xx XXX xxxx]
- * none yet
+ * Fix POLY1305 MAC implementation corrupting XMM registers on Windows.
+
+ The POLY1305 MAC (message authentication code) implementation in OpenSSL
+ does not save the contents of non-volatile XMM registers on Windows 64
+ platform when calculating the MAC of data larger than 64 bytes. Before
+ returning to the caller all the XMM registers are set to zero rather than
+ restoring their previous content. The vulnerable code is used only on newer
+ x86_64 processors supporting the AVX512-IFMA instructions.
+
+ The consequences of this kind of internal application state corruption can
+ be various - from no consequences, if the calling application does not
+ depend on the contents of non-volatile XMM registers at all, to the worst
+ consequences, where the attacker could get complete control of the
+ application process. However given the contents of the registers are just
+ zeroized so the attacker cannot put arbitrary values inside, the most likely
+ consequence, if any, would be an incorrect result of some application
+ dependent calculations or a crash leading to a denial of service.
+
+ ([CVE-2023-4807])
+
+ *Bernd Edlinger*
### Changes between 3.1.1 and 3.1.2 [1 Aug 2023]
@@ -20253,6 +20273,7 @@ ndif
<!-- Links -->
+[CVE-2023-4807]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-4807
[CVE-2023-3817]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3817
[CVE-2023-3446]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3446
[CVE-2023-2975]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2975