]> git.ipfire.org Git - thirdparty/openssl.git/commitdiff
Add CVE-2024-5535 to CHANGES and NEWS
authorTomas Mraz <tomas@openssl.org>
Tue, 3 Sep 2024 10:24:58 +0000 (12:24 +0200)
committerTomas Mraz <tomas@openssl.org>
Tue, 3 Sep 2024 12:32:39 +0000 (14:32 +0200)
Reviewed-by: Neil Horman <nhorman@openssl.org>
Release: yes
(cherry picked from commit 0c3d66a46eda9353f80e1846642b9090a8eac999)

CHANGES.md
NEWS.md

index 709a7193f24ba66d2b2b4486a49b8b0afd29da27..86efb6f3fa75b9cf45a3ad92fb37c9a494e76756 100644 (file)
@@ -38,10 +38,20 @@ breaking changes, and mappings for the large list of deprecated functions.
    an X.509 certificate. This may result in an exception that terminates the
    application program.
 
-   [(CVE-2024-6119)]
+   ([CVE-2024-6119])
 
    *Viktor Dukhovni*
 
+ * Fixed possible buffer overread in SSL_select_next_proto().
+
+   Calling the OpenSSL API function SSL_select_next_proto with an empty
+   supported client protocols buffer may cause a crash or memory contents
+   to be sent to the peer.
+
+   ([CVE-2024-5535])
+
+   *Matt Caswell*
+
 ### Changes between 3.0.13 and 3.0.14 [4 Jun 2024]
 
  * Fixed potential use after free after SSL_free_buffers() is called.
@@ -19913,6 +19923,7 @@ ndif
 <!-- Links -->
 
 [CVE-2024-6119]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-6119
+[CVE-2024-5535]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-5535
 [CVE-2024-4741]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4741
 [CVE-2024-4603]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4603
 [CVE-2024-2511]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-2511
diff --git a/NEWS.md b/NEWS.md
index b139f828b678c324bd5c2a7c0809557dbcfb6ba0..e10b6f22a4d2b85d9a088900f5155a450adeeda1 100644 (file)
--- a/NEWS.md
+++ b/NEWS.md
@@ -20,10 +20,16 @@ OpenSSL 3.0
 
 ### Major changes between OpenSSL 3.0.14 and OpenSSL 3.0.15 [under development]
 
-OpenSSL 3.3.2 is a security patch release. The most severe CVE fixed in this
+OpenSSL 3.0.15 is a security patch release. The most severe CVE fixed in this
 release is Moderate.
 
-  * Fixed possible denial of service in X.509 name checks [(CVE-2024-6119)].
+This release incorporates the following bug fixes and mitigations:
+
+  * Fixed possible denial of service in X.509 name checks
+    ([CVE-2024-6119])
+
+  * Fixed possible buffer overread in SSL_select_next_proto()
+    ([CVE-2024-5535])
 
 ### Major changes between OpenSSL 3.0.13 and OpenSSL 3.0.14 [4 Jun 2024]
 
@@ -1490,6 +1496,7 @@ OpenSSL 0.9.x
 <!-- Links -->
 
 [CVE-2024-6119]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-6119
+[CVE-2024-5535]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-5535
 [CVE-2024-4741]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4741
 [CVE-2024-4603]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4603
 [CVE-2024-2511]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-2511