Skip to content

Commit

Permalink
Update CHANGES/NEWS for CVE-2023-3446
Browse files Browse the repository at this point in the history
Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com>
Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from #21452)
  • Loading branch information
mattcaswell authored and t8m committed Jul 19, 2023
1 parent e9ddae1 commit 97b4f2b
Show file tree
Hide file tree
Showing 2 changed files with 17 additions and 2 deletions.
17 changes: 16 additions & 1 deletion CHANGES
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,22 @@

Changes between 1.1.1u and 1.1.1v [xx XXX xxxx]

*)
*) Fix DH_check() excessive time with over sized modulus

The function DH_check() performs various checks on DH parameters. One of
those checks confirms that the modulus ("p" parameter) is not too large.
Trying to use a very large modulus is slow and OpenSSL will not normally use
a modulus which is over 10,000 bits in length.

However the DH_check() function checks numerous aspects of the key or
parameters that have been supplied. Some of those checks use the supplied
modulus value even if it has already been found to be too large.

A new limit has been added to DH_check of 32,768 bits. Supplying a
key/parameters with a modulus over this size will simply cause DH_check()
to fail.
(CVE-2023-3446)
[Matt Caswell]

Changes between 1.1.1t and 1.1.1u [30 May 2023]

Expand Down
2 changes: 1 addition & 1 deletion NEWS
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@

Major changes between OpenSSL 1.1.1u and OpenSSL 1.1.1v [under development]

o
o Fix DH_check() excessive time with over sized modulus (CVE-2023-3446)

Major changes between OpenSSL 1.1.1t and OpenSSL 1.1.1u [30 May 2023]

Expand Down

0 comments on commit 97b4f2b

Please sign in to comment.