diff options
author | Tomas Mraz <tomas@openssl.org> | 2024-09-03 12:24:58 +0200 |
---|---|---|
committer | Tomas Mraz <tomas@openssl.org> | 2024-09-03 21:06:19 +0200 |
commit | 03b22b4d7370a3ddf2c1723c2ff4dc3d169ea897 (patch) | |
tree | a7bc37e0976cf35c3e5c442ed553d59c2b83ce41 | |
parent | Updated CHANGES and NEWS for CVE-2024-6119 fix (diff) | |
download | openssl-03b22b4d7370a3ddf2c1723c2ff4dc3d169ea897.tar.xz openssl-03b22b4d7370a3ddf2c1723c2ff4dc3d169ea897.zip |
Add CVE-2024-5535 to CHANGES and NEWS
Reviewed-by: Neil Horman <nhorman@openssl.org>
Release: yes
(cherry picked from commit abcb0f83d060eb816503a6a36959ce8498a24111)
-rw-r--r-- | CHANGES.md | 13 | ||||
-rw-r--r-- | NEWS.md | 9 |
2 files changed, 20 insertions, 2 deletions
diff --git a/CHANGES.md b/CHANGES.md index da1a4ba63b..219f1c881b 100644 --- a/CHANGES.md +++ b/CHANGES.md @@ -207,10 +207,20 @@ OpenSSL 3.3 an X.509 certificate. This may result in an exception that terminates the application program. - [(CVE-2024-6119)] + ([CVE-2024-6119]) *Viktor Dukhovni* + * Fixed possible buffer overread in SSL_select_next_proto(). + + Calling the OpenSSL API function SSL_select_next_proto with an empty + supported client protocols buffer may cause a crash or memory contents + to be sent to the peer. + + ([CVE-2024-5535]) + + *Matt Caswell* + ### Changes between 3.3.0 and 3.3.1 [4 Jun 2024] * Fixed potential use after free after SSL_free_buffers() is called. @@ -20847,6 +20857,7 @@ ndif <!-- Links --> [CVE-2024-6119]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-6119 +[CVE-2024-5535]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-5535 [CVE-2024-4741]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4741 [CVE-2024-4603]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4603 [CVE-2024-2511]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-2511 @@ -93,7 +93,13 @@ OpenSSL 3.3 OpenSSL 3.3.2 is a security patch release. The most severe CVE fixed in this release is Moderate. - * Fixed possible denial of service in X.509 name checks [(CVE-2024-6119)]. +This release incorporates the following bug fixes and mitigations: + + * Fixed possible denial of service in X.509 name checks + ([CVE-2024-6119]) + + * Fixed possible buffer overread in SSL_select_next_proto() + ([CVE-2024-5535]) ### Major changes between OpenSSL 3.3.0 and OpenSSL 3.3.1 [4 Jun 2024] @@ -1804,6 +1810,7 @@ OpenSSL 0.9.x <!-- Links --> [CVE-2024-6119]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-6119 +[CVE-2024-5535]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-5535 [CVE-2024-4741]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4741 [CVE-2024-4603]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4603 [CVE-2024-2511]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-2511 |