summaryrefslogtreecommitdiffstats
path: root/CHANGES.md
diff options
context:
space:
mode:
authorTomas Mraz <tomas@openssl.org>2023-09-08 15:28:45 +0200
committerTomas Mraz <tomas@openssl.org>2023-09-11 10:56:48 +0200
commitfb1a6e9dbece8541dffd5a392d0c771afe6b7de8 (patch)
tree33aaa214861e9a44451f2a253a6ca9b093ea404e /CHANGES.md
parent9396ef92e7cdb1cd4e7f2244e620c4debeebed1b (diff)
Add CVE-2023-4807 fix to CHANGES.md and NEWS.md
Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22033) (cherry picked from commit 0be7510f49e498532708fd03628fc3fc62ee7875)
Diffstat (limited to 'CHANGES.md')
-rw-r--r--CHANGES.md23
1 files changed, 22 insertions, 1 deletions
diff --git a/CHANGES.md b/CHANGES.md
index accc680a81..e531ad09de 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -24,7 +24,27 @@ OpenSSL 3.1
### Changes between 3.1.2 and 3.1.3 [xx XXX xxxx]
- * none yet
+ * Fix POLY1305 MAC implementation corrupting XMM registers on Windows.
+
+ The POLY1305 MAC (message authentication code) implementation in OpenSSL
+ does not save the contents of non-volatile XMM registers on Windows 64
+ platform when calculating the MAC of data larger than 64 bytes. Before
+ returning to the caller all the XMM registers are set to zero rather than
+ restoring their previous content. The vulnerable code is used only on newer
+ x86_64 processors supporting the AVX512-IFMA instructions.
+
+ The consequences of this kind of internal application state corruption can
+ be various - from no consequences, if the calling application does not
+ depend on the contents of non-volatile XMM registers at all, to the worst
+ consequences, where the attacker could get complete control of the
+ application process. However given the contents of the registers are just
+ zeroized so the attacker cannot put arbitrary values inside, the most likely
+ consequence, if any, would be an incorrect result of some application
+ dependent calculations or a crash leading to a denial of service.
+
+ ([CVE-2023-4807])
+
+ *Bernd Edlinger*
### Changes between 3.1.1 and 3.1.2 [1 Aug 2023]
@@ -19836,6 +19856,7 @@ ndif
<!-- Links -->
+[CVE-2023-4807]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-4807
[CVE-2023-3817]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3817
[CVE-2023-3446]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3446
[CVE-2023-2975]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2975