summaryrefslogtreecommitdiffstats
path: root/CHANGES.md
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2022-03-14 17:39:43 +0100
committerMatt Caswell <matt@openssl.org>2022-03-15 14:25:14 +0100
commita40398a15ea9c218f4a6db8fef2b925ca4d39451 (patch)
treecae1dbc5d78c18052c02aea40a5a13e5493835fc /CHANGES.md
parentAdd a negative testcase for BN_mod_sqrt (diff)
downloadopenssl-a40398a15ea9c218f4a6db8fef2b925ca4d39451.tar.xz
openssl-a40398a15ea9c218f4a6db8fef2b925ca4d39451.zip
Update CHANGES/NEWS for new release
Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org>
Diffstat (limited to 'CHANGES.md')
-rw-r--r--CHANGES.md43
1 files changed, 42 insertions, 1 deletions
diff --git a/CHANGES.md b/CHANGES.md
index eb6174966f..a343db2d50 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -114,7 +114,43 @@ breaking changes, and mappings for the large list of deprecated functions.
[Migration guide]: https://github.com/openssl/openssl/tree/master/doc/man7/migration_guide.pod
-### Changes between 3.0.1 and 3.0.2 [xx XXX xxxx]
+### Changes between 3.0.1 and 3.0.2 [15 mar 2022]
+
+ * Fixed a bug in the BN_mod_sqrt() function that can cause it to loop forever
+ for non-prime moduli.
+
+ Internally this function is used when parsing certificates that contain
+ elliptic curve public keys in compressed form or explicit elliptic curve
+ parameters with a base point encoded in compressed form.
+
+ It is possible to trigger the infinite loop by crafting a certificate that
+ has invalid explicit curve parameters.
+
+ Since certificate parsing happens prior to verification of the certificate
+ signature, any process that parses an externally supplied certificate may thus
+ be subject to a denial of service attack. The infinite loop can also be
+ reached when parsing crafted private keys as they can contain explicit
+ elliptic curve parameters.
+
+ Thus vulnerable situations include:
+
+ - TLS clients consuming server certificates
+ - TLS servers consuming client certificates
+ - Hosting providers taking certificates or private keys from customers
+ - Certificate authorities parsing certification requests from subscribers
+ - Anything else which parses ASN.1 elliptic curve parameters
+
+ Also any other applications that use the BN_mod_sqrt() where the attacker
+ can control the parameter values are vulnerable to this DoS issue.
+ ([CVE-2022-0778])
+
+ *Tomáš Mráz*
+
+ * Add ciphersuites based on DHE_PSK (RFC 4279) and ECDHE_PSK (RFC 5489)
+ to the list of ciphersuites providing Perfect Forward Secrecy as
+ required by SECLEVEL >= 3.
+
+ *Dmitry Belyavskiy, Nicola Tuveri*
* Made the AES constant time code for no-asm configurations
optional due to the resulting 95% performance degradation.
@@ -123,6 +159,11 @@ breaking changes, and mappings for the large list of deprecated functions.
*Paul Dale*
+ * Fixed PEM_write_bio_PKCS8PrivateKey() to make it possible to use empty
+ passphrase strings.
+
+ *Darshan Sen*
+
* The negative return value handling of the certificate verification callback
was reverted. The replacement is to set the verification retry state with
the SSL_set_retry_verify() function.