@@ -28,11 +28,82 @@ breaking changes, and mappings for the large list of deprecated functions.
28
28
29
29
[Migration guide]: https://github.com/openssl/openssl/tree/master/doc/man7/migration_guide.pod
30
30
31
- ### Changes between 3.0.8 and 3.0.8+quic [7 Feb 2023]
31
+ ### Changes between 3.0.9 and 3.0.9+quic [30 May 2023]
32
+ * Add QUIC API support from BoringSSL
33
+ *Todd Short*
34
+ ### Changes between 3.0.8 and 3.0.9 [30 May 2023]
32
35
33
- * Add QUIC API support from BoringSSL.
36
+ * Mitigate for the time it takes for `OBJ_obj2txt` to translate gigantic
37
+ OBJECT IDENTIFIER sub-identifiers to canonical numeric text form.
34
38
35
- *Todd Short*
39
+ OBJ_obj2txt() would translate any size OBJECT IDENTIFIER to canonical
40
+ numeric text form. For gigantic sub-identifiers, this would take a very
41
+ long time, the time complexity being O(n^2) where n is the size of that
42
+ sub-identifier. ([CVE-2023-2650])
43
+
44
+ To mitigitate this, `OBJ_obj2txt()` will only translate an OBJECT
45
+ IDENTIFIER to canonical numeric text form if the size of that OBJECT
46
+ IDENTIFIER is 586 bytes or less, and fail otherwise.
47
+
48
+ The basis for this restriction is RFC 2578 (STD 58), section 3.5. OBJECT
49
+ IDENTIFIER values, which stipulates that OBJECT IDENTIFIERS may have at
50
+ most 128 sub-identifiers, and that the maximum value that each sub-
51
+ identifier may have is 2^32-1 (4294967295 decimal).
52
+
53
+ For each byte of every sub-identifier, only the 7 lower bits are part of
54
+ the value, so the maximum amount of bytes that an OBJECT IDENTIFIER with
55
+ these restrictions may occupy is 32 * 128 / 7, which is approximately 586
56
+ bytes.
57
+
58
+ Ref: https://datatracker.ietf.org/doc/html/rfc2578#section-3.5
59
+
60
+ *Richard Levitte*
61
+
62
+ * Fixed buffer overread in AES-XTS decryption on ARM 64 bit platforms which
63
+ happens if the buffer size is 4 mod 5 in 16 byte AES blocks. This can
64
+ trigger a crash of an application using AES-XTS decryption if the memory
65
+ just after the buffer being decrypted is not mapped.
66
+ Thanks to Anton Romanov (Amazon) for discovering the issue.
67
+ ([CVE-2023-1255])
68
+
69
+ *Nevine Ebeid*
70
+
71
+ * Reworked the Fix for the Timing Oracle in RSA Decryption ([CVE-2022-4304]).
72
+ The previous fix for this timing side channel turned out to cause
73
+ a severe 2-3x performance regression in the typical use case
74
+ compared to 3.0.7. The new fix uses existing constant time
75
+ code paths, and restores the previous performance level while
76
+ fully eliminating all existing timing side channels.
77
+ The fix was developed by Bernd Edlinger with testing support
78
+ by Hubert Kario.
79
+
80
+ *Bernd Edlinger*
81
+
82
+ * Corrected documentation of X509_VERIFY_PARAM_add0_policy() to mention
83
+ that it does not enable policy checking. Thanks to David Benjamin for
84
+ discovering this issue.
85
+ ([CVE-2023-0466])
86
+
87
+ *Tomáš Mráz*
88
+
89
+ * Fixed an issue where invalid certificate policies in leaf certificates are
90
+ silently ignored by OpenSSL and other certificate policy checks are skipped
91
+ for that certificate. A malicious CA could use this to deliberately assert
92
+ invalid certificate policies in order to circumvent policy checking on the
93
+ certificate altogether.
94
+ ([CVE-2023-0465])
95
+
96
+ *Matt Caswell*
97
+
98
+ * Limited the number of nodes created in a policy tree to mitigate
99
+ against CVE-2023-0464. The default limit is set to 1000 nodes, which
100
+ should be sufficient for most installations. If required, the limit
101
+ can be adjusted by setting the OPENSSL_POLICY_TREE_NODES_MAX build
102
+ time define to a desired maximum number of nodes or zero to allow
103
+ unlimited growth.
104
+ ([CVE-2023-0464])
105
+
106
+ *Paul Dale*
36
107
37
108
### Changes between 3.0.7 and 3.0.8 [7 Feb 2023]
38
109
@@ -19584,6 +19655,11 @@ ndif
19584
19655
19585
19656
<!-- Links -->
19586
19657
19658
+ [CVE-2023-2650]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2650
19659
+ [CVE-2023-1255]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-1255
19660
+ [CVE-2023-0466]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0466
19661
+ [CVE-2023-0465]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0465
19662
+ [CVE-2023-0464]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0464
19587
19663
[CVE-2023-0401]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0401
19588
19664
[CVE-2023-0286]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0286
19589
19665
[CVE-2023-0217]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0217
@@ -19594,7 +19670,7 @@ ndif
19594
19670
[CVE-2022-4203]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-4203
19595
19671
[CVE-2022-3996]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-3996
19596
19672
[CVE-2022-2274]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-2274
19597
- [CVE-2022-2097]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-2274
19673
+ [CVE-2022-2097]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-2097
19598
19674
[CVE-2020-1971]: https://www.openssl.org/news/vulnerabilities.html#CVE-2020-1971
19599
19675
[CVE-2020-1967]: https://www.openssl.org/news/vulnerabilities.html#CVE-2020-1967
19600
19676
[CVE-2019-1563]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1563
0 commit comments