@@ -28,12 +28,44 @@ breaking changes, and mappings for the large list of deprecated functions.
28
28
29
29
[Migration guide]: https://github.com/openssl/openssl/tree/master/doc/man7/migration_guide.pod
30
30
31
- ### Changes between 3.0.10 and 3.0.10 +quic [1 Aug 2023]
31
+ ### Changes between 3.0.12 and 3.0.12 +quic [24 Oct 2023]
32
32
33
33
* Add QUIC API support from BoringSSL
34
34
35
35
*Todd Short*
36
36
37
+ ### Changes between 3.0.11 and 3.0.12 [24 Oct 2023]
38
+
39
+ * Fix incorrect key and IV resizing issues when calling EVP_EncryptInit_ex2(),
40
+ EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() with OSSL_PARAM parameters
41
+ that alter the key or IV length ([CVE-2023-5363]).
42
+
43
+ *Paul Dale*
44
+
45
+ ### Changes between 3.0.10 and 3.0.11 [19 Sep 2023]
46
+
47
+ * Fix POLY1305 MAC implementation corrupting XMM registers on Windows.
48
+
49
+ The POLY1305 MAC (message authentication code) implementation in OpenSSL
50
+ does not save the contents of non-volatile XMM registers on Windows 64
51
+ platform when calculating the MAC of data larger than 64 bytes. Before
52
+ returning to the caller all the XMM registers are set to zero rather than
53
+ restoring their previous content. The vulnerable code is used only on newer
54
+ x86_64 processors supporting the AVX512-IFMA instructions.
55
+
56
+ The consequences of this kind of internal application state corruption can
57
+ be various - from no consequences, if the calling application does not
58
+ depend on the contents of non-volatile XMM registers at all, to the worst
59
+ consequences, where the attacker could get complete control of the
60
+ application process. However given the contents of the registers are just
61
+ zeroized so the attacker cannot put arbitrary values inside, the most likely
62
+ consequence, if any, would be an incorrect result of some application
63
+ dependent calculations or a crash leading to a denial of service.
64
+
65
+ ([CVE-2023-4807])
66
+
67
+ *Bernd Edlinger*
68
+
37
69
### Changes between 3.0.9 and 3.0.10 [1 Aug 2023]
38
70
39
71
* Fix excessive time spent checking DH q parameter value.
@@ -19714,6 +19746,8 @@ ndif
19714
19746
19715
19747
<!-- Links -->
19716
19748
19749
+ [CVE-2023-5363]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-5363
19750
+ [CVE-2023-4807]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-4807
19717
19751
[CVE-2023-3817]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3817
19718
19752
[CVE-2023-3446]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3446
19719
19753
[CVE-2023-2975]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2975
0 commit comments