diff options
author | Tomas Mraz <tomas@openssl.org> | 2023-11-07 15:22:00 +0100 |
---|---|---|
committer | Tomas Mraz <tomas@openssl.org> | 2023-11-08 17:35:56 +0100 |
commit | 4d4657cb6ba364dfa60681948b0a30c40bee31ca (patch) | |
tree | 5f35de17debc897cbdbedebe14e6134be8365ba0 /CHANGES.md | |
parent | 96ee2c38ad9b1c878a11bf629499867777c18055 (diff) |
Add CHANGES.md and NEWS.md entry for CVE-2023-5678
Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/22647)
(cherry picked from commit 4ee71b4c302a06c24b46a5def1cff2096bd57f0b)
Diffstat (limited to 'CHANGES.md')
-rw-r--r-- | CHANGES.md | 15 |
1 files changed, 14 insertions, 1 deletions
diff --git a/CHANGES.md b/CHANGES.md index 98ac35500f..fd7f37fb03 100644 --- a/CHANGES.md +++ b/CHANGES.md @@ -488,7 +488,19 @@ OpenSSL 3.1 ### Changes between 3.1.4 and 3.1.5 [xx XXX xxxx] - * none yet + * Fix excessive time spent in DH check / generation with large Q parameter + value. + + Applications that use the functions DH_generate_key() to generate an + X9.42 DH key may experience long delays. Likewise, applications that use + DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() + to check an X9.42 DH key or X9.42 DH parameters may experience long delays. + Where the key or parameters that are being checked have been obtained from + an untrusted source this may lead to a Denial of Service. + + ([CVE-2023-5678]) + + *Richard Levitte* ### Changes between 3.1.3 and 3.1.4 [24 Oct 2023] @@ -20316,6 +20328,7 @@ ndif <!-- Links --> +[CVE-2023-5678]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-5678 [CVE-2023-5363]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-5363 [CVE-2023-4807]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-4807 [CVE-2023-3817]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3817 |