@@ -28,12 +28,78 @@ breaking changes, and mappings for the large list of deprecated functions.
2828
2929[Migration guide]: https://github.com/openssl/openssl/tree/master/doc/man7/migration_guide.pod
3030
31- ### Changes between 3.0.13 and 3.0.13 +quic [30 Jan 2024]
31+ ### Changes between 3.0.14 and 3.0.14 +quic [7 Jun 2024]
3232
3333* Add QUIC API support from BoringSSL
3434
3535 *Todd Short*
3636
37+ ### Changes between 3.0.13 and 3.0.14 [4 Jun 2024]
38+
39+ * Fixed potential use after free after SSL_free_buffers() is called.
40+
41+ The SSL_free_buffers function is used to free the internal OpenSSL
42+ buffer used when processing an incoming record from the network.
43+ The call is only expected to succeed if the buffer is not currently
44+ in use. However, two scenarios have been identified where the buffer
45+ is freed even when still in use.
46+
47+ The first scenario occurs where a record header has been received
48+ from the network and processed by OpenSSL, but the full record body
49+ has not yet arrived. In this case calling SSL_free_buffers will succeed
50+ even though a record has only been partially processed and the buffer
51+ is still in use.
52+
53+ The second scenario occurs where a full record containing application
54+ data has been received and processed by OpenSSL but the application has
55+ only read part of this data. Again a call to SSL_free_buffers will
56+ succeed even though the buffer is still in use.
57+
58+ ([CVE-2024-4741])
59+
60+ *Matt Caswell*
61+
62+ * Fixed an issue where checking excessively long DSA keys or parameters may
63+ be very slow.
64+
65+ Applications that use the functions EVP_PKEY_param_check() or
66+ EVP_PKEY_public_check() to check a DSA public key or DSA parameters may
67+ experience long delays. Where the key or parameters that are being checked
68+ have been obtained from an untrusted source this may lead to a Denial of
69+ Service.
70+
71+ To resolve this issue DSA keys larger than OPENSSL_DSA_MAX_MODULUS_BITS
72+ will now fail the check immediately with a DSA_R_MODULUS_TOO_LARGE error
73+ reason.
74+
75+ ([CVE-2024-4603])
76+
77+ *Tomáš Mráz*
78+
79+ * Fixed an issue where some non-default TLS server configurations can cause
80+ unbounded memory growth when processing TLSv1.3 sessions. An attacker may
81+ exploit certain server configurations to trigger unbounded memory growth that
82+ would lead to a Denial of Service
83+
84+ This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option
85+ is being used (but not if early_data is also configured and the default
86+ anti-replay protection is in use). In this case, under certain conditions,
87+ the session cache can get into an incorrect state and it will fail to flush
88+ properly as it fills. The session cache will continue to grow in an unbounded
89+ manner. A malicious client could deliberately create the scenario for this
90+ failure to force a Denial of Service. It may also happen by accident in
91+ normal operation.
92+
93+ ([CVE-2024-2511])
94+
95+ *Matt Caswell*
96+
97+ * New atexit configuration switch, which controls whether the OPENSSL_cleanup
98+ is registered when libcrypto is unloaded. This can be used on platforms
99+ where using atexit() from shared libraries causes crashes on exit.
100+
101+ *Randall S. Becker*
102+
37103### Changes between 3.0.12 and 3.0.13 [30 Jan 2024]
38104
39105 * A file in PKCS12 format can contain certificates and keys and may come from
@@ -19830,6 +19896,9 @@ ndif
1983019896
1983119897<!-- Links -->
1983219898
19899+ [CVE-2024-4741]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4741
19900+ [CVE-2024-4603]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4603
19901+ [CVE-2024-2511]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-2511
1983319902[CVE-2024-0727]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-0727
1983419903[CVE-2023-6237]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-6237
1983519904[CVE-2023-6129]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-6129
0 commit comments