diff options
author | Tomas Mraz <tomas@openssl.org> | 2024-01-09 18:08:22 +0100 |
---|---|---|
committer | Tomas Mraz <tomas@openssl.org> | 2024-01-15 10:57:18 +0100 |
commit | 3a665e45b8b08957d1ba9228bf0c9c31cff074e5 (patch) | |
tree | a75fd58dd12a1411d3889e97914b213c6fa42267 /NEWS.md | |
parent | a830f551557d3d66a84bbb18a5b889c640c36294 (diff) |
Add CHANGES.md and NEWS.md entries for CVE-2023-6237
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/23243)
(cherry picked from commit 38b2508f638787842750aec9a75745e1d8786743)
Diffstat (limited to 'NEWS.md')
-rw-r--r-- | NEWS.md | 5 |
1 files changed, 4 insertions, 1 deletions
@@ -21,7 +21,9 @@ OpenSSL 3.1 ### Major changes between OpenSSL 3.1.4 and OpenSSL 3.1.5 [under development] - * Fix POLY1305 MAC implementation corrupting vector registers on PowerPC + * Fixed Excessive time spent checking invalid RSA public keys + ([CVE-2023-6237]) + * Fixed POLY1305 MAC implementation corrupting vector registers on PowerPC CPUs which support PowerISA 2.07 ([CVE-2023-6129]) * Fix excessive time spent in DH check / generation with large Q parameter @@ -1482,6 +1484,7 @@ OpenSSL 0.9.x <!-- Links --> +[CVE-2023-6237]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-6237 [CVE-2023-6129]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-6129 [CVE-2023-5678]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-5678 [CVE-2023-5363]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-5363 |