Skip to content

Commit 46cd5fe

Browse files
nodejs-github-botRafaelGSS
authored andcommittedJun 19, 2023
deps: upgrade openssl sources to quictls/openssl-3.0.9-quic1
PR-URL: #48402 Reviewed-By: Richard Lau <rlau@redhat.com> Reviewed-By: Marco Ippolito <marcoippolito54@gmail.com> Reviewed-By: Rafael Gonzaga <rafael.nunu@hotmail.com> Reviewed-By: Tobias Nießen <tniessen@tnie.de> Reviewed-By: Mohammed Keyvanzadeh <mohammadkeyvanzade94@gmail.com>
1 parent 4ff6ba0 commit 46cd5fe

File tree

281 files changed

+4949
-3717
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

281 files changed

+4949
-3717
lines changed
 

‎deps/openssl/openssl/CHANGES.md

+80-4
Original file line numberDiff line numberDiff line change
@@ -28,11 +28,82 @@ breaking changes, and mappings for the large list of deprecated functions.
2828

2929
[Migration guide]: https://github.com/openssl/openssl/tree/master/doc/man7/migration_guide.pod
3030

31-
### Changes between 3.0.8 and 3.0.8+quic [7 Feb 2023]
31+
### Changes between 3.0.9 and 3.0.9+quic [30 May 2023]
32+
* Add QUIC API support from BoringSSL
33+
*Todd Short*
34+
### Changes between 3.0.8 and 3.0.9 [30 May 2023]
3235

33-
* Add QUIC API support from BoringSSL.
36+
* Mitigate for the time it takes for `OBJ_obj2txt` to translate gigantic
37+
OBJECT IDENTIFIER sub-identifiers to canonical numeric text form.
3438

35-
*Todd Short*
39+
OBJ_obj2txt() would translate any size OBJECT IDENTIFIER to canonical
40+
numeric text form. For gigantic sub-identifiers, this would take a very
41+
long time, the time complexity being O(n^2) where n is the size of that
42+
sub-identifier. ([CVE-2023-2650])
43+
44+
To mitigitate this, `OBJ_obj2txt()` will only translate an OBJECT
45+
IDENTIFIER to canonical numeric text form if the size of that OBJECT
46+
IDENTIFIER is 586 bytes or less, and fail otherwise.
47+
48+
The basis for this restriction is RFC 2578 (STD 58), section 3.5. OBJECT
49+
IDENTIFIER values, which stipulates that OBJECT IDENTIFIERS may have at
50+
most 128 sub-identifiers, and that the maximum value that each sub-
51+
identifier may have is 2^32-1 (4294967295 decimal).
52+
53+
For each byte of every sub-identifier, only the 7 lower bits are part of
54+
the value, so the maximum amount of bytes that an OBJECT IDENTIFIER with
55+
these restrictions may occupy is 32 * 128 / 7, which is approximately 586
56+
bytes.
57+
58+
Ref: https://datatracker.ietf.org/doc/html/rfc2578#section-3.5
59+
60+
*Richard Levitte*
61+
62+
* Fixed buffer overread in AES-XTS decryption on ARM 64 bit platforms which
63+
happens if the buffer size is 4 mod 5 in 16 byte AES blocks. This can
64+
trigger a crash of an application using AES-XTS decryption if the memory
65+
just after the buffer being decrypted is not mapped.
66+
Thanks to Anton Romanov (Amazon) for discovering the issue.
67+
([CVE-2023-1255])
68+
69+
*Nevine Ebeid*
70+
71+
* Reworked the Fix for the Timing Oracle in RSA Decryption ([CVE-2022-4304]).
72+
The previous fix for this timing side channel turned out to cause
73+
a severe 2-3x performance regression in the typical use case
74+
compared to 3.0.7. The new fix uses existing constant time
75+
code paths, and restores the previous performance level while
76+
fully eliminating all existing timing side channels.
77+
The fix was developed by Bernd Edlinger with testing support
78+
by Hubert Kario.
79+
80+
*Bernd Edlinger*
81+
82+
* Corrected documentation of X509_VERIFY_PARAM_add0_policy() to mention
83+
that it does not enable policy checking. Thanks to David Benjamin for
84+
discovering this issue.
85+
([CVE-2023-0466])
86+
87+
*Tomáš Mráz*
88+
89+
* Fixed an issue where invalid certificate policies in leaf certificates are
90+
silently ignored by OpenSSL and other certificate policy checks are skipped
91+
for that certificate. A malicious CA could use this to deliberately assert
92+
invalid certificate policies in order to circumvent policy checking on the
93+
certificate altogether.
94+
([CVE-2023-0465])
95+
96+
*Matt Caswell*
97+
98+
* Limited the number of nodes created in a policy tree to mitigate
99+
against CVE-2023-0464. The default limit is set to 1000 nodes, which
100+
should be sufficient for most installations. If required, the limit
101+
can be adjusted by setting the OPENSSL_POLICY_TREE_NODES_MAX build
102+
time define to a desired maximum number of nodes or zero to allow
103+
unlimited growth.
104+
([CVE-2023-0464])
105+
106+
*Paul Dale*
36107

37108
### Changes between 3.0.7 and 3.0.8 [7 Feb 2023]
38109

@@ -19584,6 +19655,11 @@ ndif
1958419655

1958519656
<!-- Links -->
1958619657

19658+
[CVE-2023-2650]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2650
19659+
[CVE-2023-1255]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-1255
19660+
[CVE-2023-0466]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0466
19661+
[CVE-2023-0465]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0465
19662+
[CVE-2023-0464]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0464
1958719663
[CVE-2023-0401]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0401
1958819664
[CVE-2023-0286]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0286
1958919665
[CVE-2023-0217]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0217
@@ -19594,7 +19670,7 @@ ndif
1959419670
[CVE-2022-4203]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-4203
1959519671
[CVE-2022-3996]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-3996
1959619672
[CVE-2022-2274]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-2274
19597-
[CVE-2022-2097]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-2274
19673+
[CVE-2022-2097]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-2097
1959819674
[CVE-2020-1971]: https://www.openssl.org/news/vulnerabilities.html#CVE-2020-1971
1959919675
[CVE-2020-1967]: https://www.openssl.org/news/vulnerabilities.html#CVE-2020-1967
1960019676
[CVE-2019-1563]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1563

‎deps/openssl/openssl/Configurations/10-main.conf

+5-1
Original file line numberDiff line numberDiff line change
@@ -1934,5 +1934,9 @@ my %targets = (
19341934
cflags => add("/POINTER_SIZE=64=ARGV"),
19351935
pointer_size => "64",
19361936
},
1937-
1937+
"vms-x86_64" => {
1938+
inherit_from => [ "vms-generic" ],
1939+
bn_ops => "SIXTY_FOUR_BIT",
1940+
pointer_size => "",
1941+
}
19381942
);

0 commit comments

Comments
 (0)
Please sign in to comment.