diff options
author | Matt Caswell <matt@openssl.org> | 2023-07-13 16:14:49 +0100 |
---|---|---|
committer | Tomas Mraz <tomas@openssl.org> | 2023-07-19 11:21:20 +0200 |
commit | 047a4c5c3284fc22f9842402ce210242d01df877 (patch) | |
tree | 7b07a326d97fe3bbcfccbc01a0673c5c05f8261b /NEWS.md | |
parent | 4791e79b8803924b28c19af4d4036ad85335110d (diff) |
Update CHANGES/NEWS for CVE-2023-3446
Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com>
Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/21451)
(cherry picked from commit 4ec53ad6e1791daafbe26bdbd539f2ba9172959a)
Diffstat (limited to 'NEWS.md')
-rw-r--r-- | NEWS.md | 2 |
1 files changed, 2 insertions, 0 deletions
@@ -21,6 +21,7 @@ OpenSSL 3.1 ### Major changes between OpenSSL 3.1.1 and OpenSSL 3.1.2 [under development] + * Fix DH_check() excessive time with over sized modulus ([CVE-2023-3446]) * Do not ignore empty associated data entries with AES-SIV ([CVE-2023-2975]) * When building with the `enable-fips` option and using the resulting FIPS provider, TLS 1.2 will, by default, mandate the use of an @@ -1462,6 +1463,7 @@ OpenSSL 0.9.x <!-- Links --> +[CVE-2023-3446]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3446 [CVE-2023-2975]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2975 [CVE-2023-2650]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2650 [CVE-2023-1255]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-1255 |