|
| 1 | +--- |
| 2 | +date: 2023-10-25:00:15.000Z |
| 3 | +category: vulnerability |
| 4 | +title: OpenSSL Recent Security Patches |
| 5 | +slug: openssl-fixes-in-regular-releases-oct2023 |
| 6 | +layout: blog-post.hbs |
| 7 | +author: Rafael Gonzaga |
| 8 | +--- |
| 9 | + |
| 10 | +## Summary |
| 11 | + |
| 12 | +For the vulnerabilities disclosed in the OpenSSL Security Advisories of: |
| 13 | + |
| 14 | +- OpenSSL 3.0.11 - Tuesday 19th September 2023 |
| 15 | +- OpenSSL 3.0.12 - Tuesday 24th October 2023 |
| 16 | + |
| 17 | +Node.js (Windows) is affected by one vulnerability rated as LOW. |
| 18 | +Therefore, these patches will be released in regular Node.js releases. |
| 19 | + |
| 20 | +## Analysis |
| 21 | + |
| 22 | +Our assessment of the following security advisories: |
| 23 | + |
| 24 | +- [OpenSSL 3.0.11](https://mta.openssl.org/pipermail/openssl-announce/2023-September/000273.html) |
| 25 | +- [OpenSSL 3.0.12](https://mta.openssl.org/pipermail/openssl-announce/2023-October/000282.html) |
| 26 | + |
| 27 | +is: |
| 28 | + |
| 29 | +### POLY1305 MAC implementation corrupts XMM registers on Windows (CVE-2023-4807) - Low |
| 30 | + |
| 31 | +Node.js is affected by this vulnerability. The CVE-2023-4807 |
| 32 | +affects Windows users, and the vulnerability is rated as LOW by the OpenSSL |
| 33 | +Security Team. |
| 34 | + |
| 35 | +### Incorrect cipher key & IV length processing (CVE-2023-5363) - Moderate |
| 36 | + |
| 37 | +Node.js doesn't make use or export `EVP_EncryptInit_ex2()`, `EVP_DecryptInit_ex2()` or |
| 38 | +`EVP_CipherInit_ex2()` functions. Node.js is not affected. |
| 39 | + |
| 40 | +Users who call the affected OpenSSL functions through other means, |
| 41 | +such as through native addons, can dynamically link against a patched version of OpenSSL |
| 42 | +until new releases of Node.js are available. |
| 43 | + |
| 44 | +### Contact and future updates |
| 45 | + |
| 46 | +The current Node.js security policy can be found at <https://github.com/nodejs/node/security/policy#security>, |
| 47 | +including information on how to report a vulnerability in Node.js. |
| 48 | + |
| 49 | +Subscribe to the low-volume announcement-only **nodejs-sec** mailing list at |
| 50 | +https://groups.google.com/forum/#!forum/nodejs-sec to stay up to date on |
| 51 | +security vulnerabilities and security-related releases of Node.js and the |
| 52 | +projects maintained in the |
| 53 | +[nodejs GitHub organization](https://github.com/nodejs). |
0 commit comments