@@ -28,12 +28,78 @@ breaking changes, and mappings for the large list of deprecated functions.
28
28
29
29
[Migration guide]: https://github.com/openssl/openssl/tree/master/doc/man7/migration_guide.pod
30
30
31
- ### Changes between 3.0.13 and 3.0.13 +quic [30 Jan 2024]
31
+ ### Changes between 3.0.14 and 3.0.14 +quic [7 Jun 2024]
32
32
33
33
* Add QUIC API support from BoringSSL
34
34
35
35
*Todd Short*
36
36
37
+ ### Changes between 3.0.13 and 3.0.14 [4 Jun 2024]
38
+
39
+ * Fixed potential use after free after SSL_free_buffers() is called.
40
+
41
+ The SSL_free_buffers function is used to free the internal OpenSSL
42
+ buffer used when processing an incoming record from the network.
43
+ The call is only expected to succeed if the buffer is not currently
44
+ in use. However, two scenarios have been identified where the buffer
45
+ is freed even when still in use.
46
+
47
+ The first scenario occurs where a record header has been received
48
+ from the network and processed by OpenSSL, but the full record body
49
+ has not yet arrived. In this case calling SSL_free_buffers will succeed
50
+ even though a record has only been partially processed and the buffer
51
+ is still in use.
52
+
53
+ The second scenario occurs where a full record containing application
54
+ data has been received and processed by OpenSSL but the application has
55
+ only read part of this data. Again a call to SSL_free_buffers will
56
+ succeed even though the buffer is still in use.
57
+
58
+ ([CVE-2024-4741])
59
+
60
+ *Matt Caswell*
61
+
62
+ * Fixed an issue where checking excessively long DSA keys or parameters may
63
+ be very slow.
64
+
65
+ Applications that use the functions EVP_PKEY_param_check() or
66
+ EVP_PKEY_public_check() to check a DSA public key or DSA parameters may
67
+ experience long delays. Where the key or parameters that are being checked
68
+ have been obtained from an untrusted source this may lead to a Denial of
69
+ Service.
70
+
71
+ To resolve this issue DSA keys larger than OPENSSL_DSA_MAX_MODULUS_BITS
72
+ will now fail the check immediately with a DSA_R_MODULUS_TOO_LARGE error
73
+ reason.
74
+
75
+ ([CVE-2024-4603])
76
+
77
+ *Tomáš Mráz*
78
+
79
+ * Fixed an issue where some non-default TLS server configurations can cause
80
+ unbounded memory growth when processing TLSv1.3 sessions. An attacker may
81
+ exploit certain server configurations to trigger unbounded memory growth that
82
+ would lead to a Denial of Service
83
+
84
+ This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option
85
+ is being used (but not if early_data is also configured and the default
86
+ anti-replay protection is in use). In this case, under certain conditions,
87
+ the session cache can get into an incorrect state and it will fail to flush
88
+ properly as it fills. The session cache will continue to grow in an unbounded
89
+ manner. A malicious client could deliberately create the scenario for this
90
+ failure to force a Denial of Service. It may also happen by accident in
91
+ normal operation.
92
+
93
+ ([CVE-2024-2511])
94
+
95
+ *Matt Caswell*
96
+
97
+ * New atexit configuration switch, which controls whether the OPENSSL_cleanup
98
+ is registered when libcrypto is unloaded. This can be used on platforms
99
+ where using atexit() from shared libraries causes crashes on exit.
100
+
101
+ *Randall S. Becker*
102
+
37
103
### Changes between 3.0.12 and 3.0.13 [30 Jan 2024]
38
104
39
105
* A file in PKCS12 format can contain certificates and keys and may come from
@@ -19830,6 +19896,9 @@ ndif
19830
19896
19831
19897
<!-- Links -->
19832
19898
19899
+ [CVE-2024-4741]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4741
19900
+ [CVE-2024-4603]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4603
19901
+ [CVE-2024-2511]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-2511
19833
19902
[CVE-2024-0727]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-0727
19834
19903
[CVE-2023-6237]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-6237
19835
19904
[CVE-2023-6129]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-6129
0 commit comments