summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorTomas Mraz <tomas@openssl.org>2024-09-03 12:24:58 +0200
committerTomas Mraz <tomas@openssl.org>2024-09-03 21:06:19 +0200
commit03b22b4d7370a3ddf2c1723c2ff4dc3d169ea897 (patch)
treea7bc37e0976cf35c3e5c442ed553d59c2b83ce41
parentUpdated CHANGES and NEWS for CVE-2024-6119 fix (diff)
downloadopenssl-03b22b4d7370a3ddf2c1723c2ff4dc3d169ea897.tar.xz
openssl-03b22b4d7370a3ddf2c1723c2ff4dc3d169ea897.zip
Add CVE-2024-5535 to CHANGES and NEWS
Reviewed-by: Neil Horman <nhorman@openssl.org> Release: yes (cherry picked from commit abcb0f83d060eb816503a6a36959ce8498a24111)
-rw-r--r--CHANGES.md13
-rw-r--r--NEWS.md9
2 files changed, 20 insertions, 2 deletions
diff --git a/CHANGES.md b/CHANGES.md
index da1a4ba63b..219f1c881b 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -207,10 +207,20 @@ OpenSSL 3.3
an X.509 certificate. This may result in an exception that terminates the
application program.
- [(CVE-2024-6119)]
+ ([CVE-2024-6119])
*Viktor Dukhovni*
+ * Fixed possible buffer overread in SSL_select_next_proto().
+
+ Calling the OpenSSL API function SSL_select_next_proto with an empty
+ supported client protocols buffer may cause a crash or memory contents
+ to be sent to the peer.
+
+ ([CVE-2024-5535])
+
+ *Matt Caswell*
+
### Changes between 3.3.0 and 3.3.1 [4 Jun 2024]
* Fixed potential use after free after SSL_free_buffers() is called.
@@ -20847,6 +20857,7 @@ ndif
<!-- Links -->
[CVE-2024-6119]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-6119
+[CVE-2024-5535]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-5535
[CVE-2024-4741]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4741
[CVE-2024-4603]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4603
[CVE-2024-2511]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-2511
diff --git a/NEWS.md b/NEWS.md
index 7130364678..c2797a49ce 100644
--- a/NEWS.md
+++ b/NEWS.md
@@ -93,7 +93,13 @@ OpenSSL 3.3
OpenSSL 3.3.2 is a security patch release. The most severe CVE fixed in this
release is Moderate.
- * Fixed possible denial of service in X.509 name checks [(CVE-2024-6119)].
+This release incorporates the following bug fixes and mitigations:
+
+ * Fixed possible denial of service in X.509 name checks
+ ([CVE-2024-6119])
+
+ * Fixed possible buffer overread in SSL_select_next_proto()
+ ([CVE-2024-5535])
### Major changes between OpenSSL 3.3.0 and OpenSSL 3.3.1 [4 Jun 2024]
@@ -1804,6 +1810,7 @@ OpenSSL 0.9.x
<!-- Links -->
[CVE-2024-6119]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-6119
+[CVE-2024-5535]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-5535
[CVE-2024-4741]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4741
[CVE-2024-4603]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4603
[CVE-2024-2511]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-2511