Skip to content

Commit 46c7824

Browse files
nodejs-github-botaduh95
authored andcommittedNov 2, 2024
deps: upgrade openssl sources to quictls/openssl-3.0.15+quic1
PR-URL: #55184 Reviewed-By: Rafael Gonzaga <rafael.nunu@hotmail.com> Reviewed-By: Richard Lau <rlau@redhat.com> Reviewed-By: Michael Dawson <midawson@redhat.com> Reviewed-By: Luigi Pinca <luigipinca@gmail.com>
1 parent c50f013 commit 46c7824

File tree

205 files changed

+2458
-863
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

205 files changed

+2458
-863
lines changed
 

‎deps/openssl/openssl/CHANGES.md

+35-1
Original file line numberDiff line numberDiff line change
@@ -28,12 +28,36 @@ breaking changes, and mappings for the large list of deprecated functions.
2828

2929
[Migration guide]: https://github.com/openssl/openssl/tree/master/doc/man7/migration_guide.pod
3030

31-
### Changes between 3.0.14 and 3.0.14+quic [7 Jun 2024]
31+
### Changes between 3.0.15 and 3.0.15+quic [3 Sep 2024]
3232

3333
* Add QUIC API support from BoringSSL
3434

3535
*Todd Short*
3636

37+
### Changes between 3.0.14 and 3.0.15 [3 Sep 2024]
38+
39+
* Fixed possible denial of service in X.509 name checks.
40+
41+
Applications performing certificate name checks (e.g., TLS clients checking
42+
server certificates) may attempt to read an invalid memory address when
43+
comparing the expected name with an `otherName` subject alternative name of
44+
an X.509 certificate. This may result in an exception that terminates the
45+
application program.
46+
47+
([CVE-2024-6119])
48+
49+
*Viktor Dukhovni*
50+
51+
* Fixed possible buffer overread in SSL_select_next_proto().
52+
53+
Calling the OpenSSL API function SSL_select_next_proto with an empty
54+
supported client protocols buffer may cause a crash or memory contents
55+
to be sent to the peer.
56+
57+
([CVE-2024-5535])
58+
59+
*Matt Caswell*
60+
3761
### Changes between 3.0.13 and 3.0.14 [4 Jun 2024]
3862

3963
* Fixed potential use after free after SSL_free_buffers() is called.
@@ -76,6 +100,14 @@ breaking changes, and mappings for the large list of deprecated functions.
76100

77101
*Tomáš Mráz*
78102

103+
* Improved EC/DSA nonce generation routines to avoid bias and timing
104+
side channel leaks.
105+
106+
Thanks to Florian Sieck from Universität zu Lübeck and George Pantelakis
107+
and Hubert Kario from Red Hat for reporting the issues.
108+
109+
*Tomáš Mráz and Paul Dale*
110+
79111
* Fixed an issue where some non-default TLS server configurations can cause
80112
unbounded memory growth when processing TLSv1.3 sessions. An attacker may
81113
exploit certain server configurations to trigger unbounded memory growth that
@@ -19896,6 +19928,8 @@ ndif
1989619928

1989719929
<!-- Links -->
1989819930

19931+
[CVE-2024-6119]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-6119
19932+
[CVE-2024-5535]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-5535
1989919933
[CVE-2024-4741]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4741
1990019934
[CVE-2024-4603]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4603
1990119935
[CVE-2024-2511]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-2511

‎deps/openssl/openssl/CONTRIBUTING.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ HOW TO CONTRIBUTE TO OpenSSL
33

44
Please visit our [Getting Started] page for other ideas about how to contribute.
55

6-
[Getting Started]: <https://www.openssl.org/community/getting-started.html>
6+
[Getting Started]: <https://openssl-library.org/community/getting-started>
77

88
Development is done on GitHub in the [openssl/openssl] repository.
99

@@ -77,8 +77,8 @@ guidelines:
7777
Clean builds via GitHub Actions are required. They are started automatically
7878
whenever a PR is created or updated by committers.
7979
80-
[coding style]: https://www.openssl.org/policies/technical/coding-style.html
81-
[documentation policy]: https://openssl.org/policies/technical/documentation-policy.html
80+
[coding style]: https://openssl-library.org/policies/technical/coding-style/
81+
[documentation policy]: https://openssl-library.org/policies/technical/documentation-policy/
8282
8383
5. When at all possible, code contributions should include tests. These can
8484
either be added to an existing test, or completely new. Please see

0 commit comments

Comments
 (0)