diff options
author | Matt Caswell <matt@openssl.org> | 2023-07-13 17:14:49 +0200 |
---|---|---|
committer | Tomas Mraz <tomas@openssl.org> | 2023-07-19 11:20:05 +0200 |
commit | 4ec53ad6e1791daafbe26bdbd539f2ba9172959a (patch) | |
tree | af721520e675a684cc20de87e3a857c5928cea32 /NEWS.md | |
parent | Add a test for CVE-2023-3446 (diff) | |
download | openssl-4ec53ad6e1791daafbe26bdbd539f2ba9172959a.tar.xz openssl-4ec53ad6e1791daafbe26bdbd539f2ba9172959a.zip |
Update CHANGES/NEWS for CVE-2023-3446
Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com>
Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/21451)
Diffstat (limited to 'NEWS.md')
-rw-r--r-- | NEWS.md | 2 |
1 files changed, 2 insertions, 0 deletions
@@ -39,6 +39,7 @@ OpenSSL 3.1 ### Major changes between OpenSSL 3.1.1 and OpenSSL 3.1.2 [under development] + * Fix DH_check() excessive time with over sized modulus ([CVE-2023-3446]) * Do not ignore empty associated data entries with AES-SIV ([CVE-2023-2975]) * When building with the `enable-fips` option and using the resulting FIPS provider, TLS 1.2 will, by default, mandate the use of an @@ -1480,6 +1481,7 @@ OpenSSL 0.9.x <!-- Links --> +[CVE-2023-3446]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3446 [CVE-2023-2975]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2975 [CVE-2023-2650]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2650 [CVE-2023-1255]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-1255 |