diff options
author | Tomas Mraz <tomas@openssl.org> | 2023-09-08 15:28:45 +0200 |
---|---|---|
committer | Tomas Mraz <tomas@openssl.org> | 2023-09-11 10:56:48 +0200 |
commit | fb1a6e9dbece8541dffd5a392d0c771afe6b7de8 (patch) | |
tree | 33aaa214861e9a44451f2a253a6ca9b093ea404e /CHANGES.md | |
parent | 9396ef92e7cdb1cd4e7f2244e620c4debeebed1b (diff) |
Add CVE-2023-4807 fix to CHANGES.md and NEWS.md
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Hugo Landau <hlandau@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/22033)
(cherry picked from commit 0be7510f49e498532708fd03628fc3fc62ee7875)
Diffstat (limited to 'CHANGES.md')
-rw-r--r-- | CHANGES.md | 23 |
1 files changed, 22 insertions, 1 deletions
diff --git a/CHANGES.md b/CHANGES.md index accc680a81..e531ad09de 100644 --- a/CHANGES.md +++ b/CHANGES.md @@ -24,7 +24,27 @@ OpenSSL 3.1 ### Changes between 3.1.2 and 3.1.3 [xx XXX xxxx] - * none yet + * Fix POLY1305 MAC implementation corrupting XMM registers on Windows. + + The POLY1305 MAC (message authentication code) implementation in OpenSSL + does not save the contents of non-volatile XMM registers on Windows 64 + platform when calculating the MAC of data larger than 64 bytes. Before + returning to the caller all the XMM registers are set to zero rather than + restoring their previous content. The vulnerable code is used only on newer + x86_64 processors supporting the AVX512-IFMA instructions. + + The consequences of this kind of internal application state corruption can + be various - from no consequences, if the calling application does not + depend on the contents of non-volatile XMM registers at all, to the worst + consequences, where the attacker could get complete control of the + application process. However given the contents of the registers are just + zeroized so the attacker cannot put arbitrary values inside, the most likely + consequence, if any, would be an incorrect result of some application + dependent calculations or a crash leading to a denial of service. + + ([CVE-2023-4807]) + + *Bernd Edlinger* ### Changes between 3.1.1 and 3.1.2 [1 Aug 2023] @@ -19836,6 +19856,7 @@ ndif <!-- Links --> +[CVE-2023-4807]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-4807 [CVE-2023-3817]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3817 [CVE-2023-3446]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3446 [CVE-2023-2975]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2975 |