summaryrefslogtreecommitdiffstats
path: root/NEWS.md
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2023-07-13 16:14:49 +0100
committerTomas Mraz <tomas@openssl.org>2023-07-19 11:20:05 +0200
commit4ec53ad6e1791daafbe26bdbd539f2ba9172959a (patch)
treeaf721520e675a684cc20de87e3a857c5928cea32 /NEWS.md
parentede782b4c8868d1f09c9cd237f82b6f35b7dba8b (diff)
Update CHANGES/NEWS for CVE-2023-3446
Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21451)
Diffstat (limited to 'NEWS.md')
-rw-r--r--NEWS.md2
1 files changed, 2 insertions, 0 deletions
diff --git a/NEWS.md b/NEWS.md
index 7bfc645626..899be2b616 100644
--- a/NEWS.md
+++ b/NEWS.md
@@ -39,6 +39,7 @@ OpenSSL 3.1
### Major changes between OpenSSL 3.1.1 and OpenSSL 3.1.2 [under development]
+ * Fix DH_check() excessive time with over sized modulus ([CVE-2023-3446])
* Do not ignore empty associated data entries with AES-SIV ([CVE-2023-2975])
* When building with the `enable-fips` option and using the resulting
FIPS provider, TLS 1.2 will, by default, mandate the use of an
@@ -1480,6 +1481,7 @@ OpenSSL 0.9.x
<!-- Links -->
+[CVE-2023-3446]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3446
[CVE-2023-2975]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2975
[CVE-2023-2650]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2650
[CVE-2023-1255]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-1255