Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency openssl/openssl to v3.3.1 #95

Merged
merged 1 commit into from
Jun 4, 2024

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Jun 4, 2024

Mend Renovate

This PR contains the following updates:

Package Update Change
openssl/openssl patch 3.3.0 -> 3.3.1

Release Notes

openssl/openssl (openssl/openssl)

v3.3.1

Compare Source

  • Fixed potential use after free after SSL_free_buffers() is called.

    The SSL_free_buffers function is used to free the internal OpenSSL
    buffer used when processing an incoming record from the network.
    The call is only expected to succeed if the buffer is not currently
    in use. However, two scenarios have been identified where the buffer
    is freed even when still in use.

    The first scenario occurs where a record header has been received
    from the network and processed by OpenSSL, but the full record body
    has not yet arrived. In this case calling SSL_free_buffers will succeed
    even though a record has only been partially processed and the buffer
    is still in use.

    The second scenario occurs where a full record containing application
    data has been received and processed by OpenSSL but the application has
    only read part of this data. Again a call to SSL_free_buffers will
    succeed even though the buffer is still in use.

    ([CVE-2024-4741])

    Matt Caswell

  • Fixed an issue where checking excessively long DSA keys or parameters may
    be very slow.

    Applications that use the functions EVP_PKEY_param_check() or
    EVP_PKEY_public_check() to check a DSA public key or DSA parameters may
    experience long delays. Where the key or parameters that are being checked
    have been obtained from an untrusted source this may lead to a Denial of
    Service.

    To resolve this issue DSA keys larger than OPENSSL_DSA_MAX_MODULUS_BITS
    will now fail the check immediately with a DSA_R_MODULUS_TOO_LARGE error
    reason.

    ([CVE-2024-4603])

    Tomáš Mráz


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - "before 2am" (UTC).

🚦 Automerge: Enabled.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@renovate renovate bot enabled auto-merge (rebase) June 4, 2024 17:23
@renovate renovate bot merged commit 7a7db3a into master Jun 4, 2024
1 check passed
@renovate renovate bot deleted the renovate/openssl-openssl-3.x branch June 4, 2024 17:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants