Skip to content

Commit 719d351

Browse files
RafaelGSSmhdawson
andauthored
blog: add openssl assessment (#6048)
* blog: add openssl assessment * Apply suggestions from code review Co-authored-by: Michael Dawson <[email protected]> Signed-off-by: Rafael Gonzaga <[email protected]> --------- Signed-off-by: Rafael Gonzaga <[email protected]> Co-authored-by: Michael Dawson <[email protected]>
1 parent e13868c commit 719d351

File tree

1 file changed

+53
-0
lines changed

1 file changed

+53
-0
lines changed
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
---
2+
date: 2023-10-25:00:15.000Z
3+
category: vulnerability
4+
title: OpenSSL Recent Security Patches
5+
slug: openssl-fixes-in-regular-releases-oct2023
6+
layout: blog-post.hbs
7+
author: Rafael Gonzaga
8+
---
9+
10+
## Summary
11+
12+
For the vulnerabilities disclosed in the OpenSSL Security Advisories of:
13+
14+
- OpenSSL 3.0.11 - Tuesday 19th September 2023
15+
- OpenSSL 3.0.12 - Tuesday 24th October 2023
16+
17+
Node.js (Windows) is affected by one vulnerability rated as LOW.
18+
Therefore, these patches will be released in regular Node.js releases.
19+
20+
## Analysis
21+
22+
Our assessment of the following security advisories:
23+
24+
- [OpenSSL 3.0.11](https://mta.openssl.org/pipermail/openssl-announce/2023-September/000273.html)
25+
- [OpenSSL 3.0.12](https://mta.openssl.org/pipermail/openssl-announce/2023-October/000282.html)
26+
27+
is:
28+
29+
### POLY1305 MAC implementation corrupts XMM registers on Windows (CVE-2023-4807) - Low
30+
31+
Node.js is affected by this vulnerability. The CVE-2023-4807
32+
affects Windows users, and the vulnerability is rated as LOW by the OpenSSL
33+
Security Team.
34+
35+
### Incorrect cipher key & IV length processing (CVE-2023-5363) - Moderate
36+
37+
Node.js doesn't make use or export `EVP_EncryptInit_ex2()`, `EVP_DecryptInit_ex2()` or
38+
`EVP_CipherInit_ex2()` functions. Node.js is not affected.
39+
40+
Users who call the affected OpenSSL functions through other means,
41+
such as through native addons, can dynamically link against a patched version of OpenSSL
42+
until new releases of Node.js are available.
43+
44+
### Contact and future updates
45+
46+
The current Node.js security policy can be found at <https://github.com/nodejs/node/security/policy#security>,
47+
including information on how to report a vulnerability in Node.js.
48+
49+
Subscribe to the low-volume announcement-only **nodejs-sec** mailing list at
50+
https://groups.google.com/forum/#!forum/nodejs-sec to stay up to date on
51+
security vulnerabilities and security-related releases of Node.js and the
52+
projects maintained in the
53+
[nodejs GitHub organization](https://github.com/nodejs).

0 commit comments

Comments
 (0)