@@ -28,12 +28,36 @@ breaking changes, and mappings for the large list of deprecated functions.
28
28
29
29
[Migration guide]: https://github.com/openssl/openssl/tree/master/doc/man7/migration_guide.pod
30
30
31
- ### Changes between 3.0.14 and 3.0.14 +quic [7 Jun 2024]
31
+ ### Changes between 3.0.15 and 3.0.15 +quic [3 Sep 2024]
32
32
33
33
* Add QUIC API support from BoringSSL
34
34
35
35
*Todd Short*
36
36
37
+ ### Changes between 3.0.14 and 3.0.15 [3 Sep 2024]
38
+
39
+ * Fixed possible denial of service in X.509 name checks.
40
+
41
+ Applications performing certificate name checks (e.g., TLS clients checking
42
+ server certificates) may attempt to read an invalid memory address when
43
+ comparing the expected name with an `otherName` subject alternative name of
44
+ an X.509 certificate. This may result in an exception that terminates the
45
+ application program.
46
+
47
+ ([CVE-2024-6119])
48
+
49
+ *Viktor Dukhovni*
50
+
51
+ * Fixed possible buffer overread in SSL_select_next_proto().
52
+
53
+ Calling the OpenSSL API function SSL_select_next_proto with an empty
54
+ supported client protocols buffer may cause a crash or memory contents
55
+ to be sent to the peer.
56
+
57
+ ([CVE-2024-5535])
58
+
59
+ *Matt Caswell*
60
+
37
61
### Changes between 3.0.13 and 3.0.14 [4 Jun 2024]
38
62
39
63
* Fixed potential use after free after SSL_free_buffers() is called.
@@ -76,6 +100,14 @@ breaking changes, and mappings for the large list of deprecated functions.
76
100
77
101
*Tomáš Mráz*
78
102
103
+ * Improved EC/DSA nonce generation routines to avoid bias and timing
104
+ side channel leaks.
105
+
106
+ Thanks to Florian Sieck from Universität zu Lübeck and George Pantelakis
107
+ and Hubert Kario from Red Hat for reporting the issues.
108
+
109
+ *Tomáš Mráz and Paul Dale*
110
+
79
111
* Fixed an issue where some non-default TLS server configurations can cause
80
112
unbounded memory growth when processing TLSv1.3 sessions. An attacker may
81
113
exploit certain server configurations to trigger unbounded memory growth that
@@ -19896,6 +19928,8 @@ ndif
19896
19928
19897
19929
<!-- Links -->
19898
19930
19931
+ [CVE-2024-6119]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-6119
19932
+ [CVE-2024-5535]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-5535
19899
19933
[CVE-2024-4741]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4741
19900
19934
[CVE-2024-4603]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4603
19901
19935
[CVE-2024-2511]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-2511
0 commit comments