Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
3a2dc260
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
9
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
未验证
提交
3a2dc260
编写于
8月 02, 2023
作者:
O
openharmony_ci
提交者:
Gitee
8月 02, 2023
浏览文件
操作
浏览文件
下载
差异文件
!129 fix-CVE-2023-3817
Merge pull request !129 from code4lala/fix-CVE-2023-3817
上级
2a14625b
ceb53c98
变更
3
隐藏空白更改
内联
并排
Showing
3 changed file
with
30 addition
and
3 deletion
+30
-3
CHANGES.md
CHANGES.md
+20
-2
NEWS.md
NEWS.md
+2
-0
crypto/dh/dh_check.c
crypto/dh/dh_check.c
+8
-1
未找到文件。
CHANGES.md
浏览文件 @
3a2dc260
...
@@ -28,7 +28,24 @@ breaking changes, and mappings for the large list of deprecated functions.
...
@@ -28,7 +28,24 @@ breaking changes, and mappings for the large list of deprecated functions.
[Migration guide]: https://github.com/openssl/openssl/tree/master/doc/man7/migration_guide.pod
[Migration guide]: https://github.com/openssl/openssl/tree/master/doc/man7/migration_guide.pod
* Fix DH_check() excessive time with over sized modulus
* Fix excessive time spent checking DH q parameter value.
The function DH_check() performs various checks on DH parameters. After
fixing CVE-2023-3446 it was discovered that a large q parameter value can
also trigger an overly long computation during some of these checks.
A correct q value, if present, cannot be larger than the modulus p
parameter, thus it is unnecessary to perform these checks if q is larger
than p.
If DH_check() is called with such q parameter value,
DH_CHECK_INVALID_Q_VALUE return flag is set and the computationally
intensive checks are skipped.
([CVE-2023-3817])
*Tomáš Mráz*
* Fix DH_check() excessive time with over sized modulus.
The function DH_check() performs various checks on DH parameters. One of
The function DH_check() performs various checks on DH parameters. One of
those checks confirms that the modulus ("p" parameter) is not too large.
those checks confirms that the modulus ("p" parameter) is not too large.
...
@@ -65,7 +82,7 @@ breaking changes, and mappings for the large list of deprecated functions.
...
@@ -65,7 +82,7 @@ breaking changes, and mappings for the large list of deprecated functions.
has to skip calls to `EVP_DecryptUpdate()` for empty associated data
has to skip calls to `EVP_DecryptUpdate()` for empty associated data
entries.
entries.
*Tom
as Mra
z*
*Tom
áš Mrá
z*
* Mitigate for the time it takes for `OBJ_obj2txt` to translate gigantic
* Mitigate for the time it takes for `OBJ_obj2txt` to translate gigantic
OBJECT IDENTIFIER sub-identifiers to canonical numeric text form.
OBJECT IDENTIFIER sub-identifiers to canonical numeric text form.
...
@@ -19514,6 +19531,7 @@ ndif
...
@@ -19514,6 +19531,7 @@ ndif
<!-- Links -->
<!-- Links -->
[CVE-2023-3817]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3817
[CVE-2023-3446]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3446
[CVE-2023-3446]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3446
[CVE-2023-2975]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2975
[CVE-2023-2975]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2975
[CVE-2023-2650]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2650
[CVE-2023-2650]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2650
...
...
NEWS.md
浏览文件 @
3a2dc260
...
@@ -17,6 +17,7 @@ OpenSSL Releases
...
@@ -17,6 +17,7 @@ OpenSSL Releases
OpenSSL 3.0
OpenSSL 3.0
-----------
-----------
*
Fix excessive time spent checking DH q parameter value ([CVE-2023-3817])
*
Fix DH_check() excessive time with over sized modulus ([CVE-2023-3446])
*
Fix DH_check() excessive time with over sized modulus ([CVE-2023-3446])
*
Do not ignore empty associated data entries with AES-SIV ([CVE-2023-2975])
*
Do not ignore empty associated data entries with AES-SIV ([CVE-2023-2975])
*
Mitigate for very slow
`OBJ_obj2txt()`
performance with gigantic OBJECT
*
Mitigate for very slow
`OBJ_obj2txt()`
performance with gigantic OBJECT
...
@@ -1426,6 +1427,7 @@ OpenSSL 0.9.x
...
@@ -1426,6 +1427,7 @@ OpenSSL 0.9.x
<!-- Links -->
<!-- Links -->
[
CVE-2023-3817
]:
https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3817
[
CVE-2023-3446
]:
https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3446
[
CVE-2023-3446
]:
https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3446
[
CVE-2023-2975
]:
https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2975
[
CVE-2023-2975
]:
https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2975
[
CVE-2023-2650
]:
https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2650
[
CVE-2023-2650
]:
https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2650
...
...
crypto/dh/dh_check.c
浏览文件 @
3a2dc260
...
@@ -143,7 +143,7 @@ int DH_check(const DH *dh, int *ret)
...
@@ -143,7 +143,7 @@ int DH_check(const DH *dh, int *ret)
#ifdef FIPS_MODULE
#ifdef FIPS_MODULE
return
DH_check_params
(
dh
,
ret
);
return
DH_check_params
(
dh
,
ret
);
#else
#else
int
ok
=
0
,
r
;
int
ok
=
0
,
r
,
q_good
=
0
;
BN_CTX
*
ctx
=
NULL
;
BN_CTX
*
ctx
=
NULL
;
BIGNUM
*
t1
=
NULL
,
*
t2
=
NULL
;
BIGNUM
*
t1
=
NULL
,
*
t2
=
NULL
;
int
nid
=
DH_get_nid
((
DH
*
)
dh
);
int
nid
=
DH_get_nid
((
DH
*
)
dh
);
...
@@ -171,6 +171,13 @@ int DH_check(const DH *dh, int *ret)
...
@@ -171,6 +171,13 @@ int DH_check(const DH *dh, int *ret)
goto
err
;
goto
err
;
if
(
dh
->
params
.
q
!=
NULL
)
{
if
(
dh
->
params
.
q
!=
NULL
)
{
if
(
BN_ucmp
(
dh
->
params
.
p
,
dh
->
params
.
q
)
>
0
)
q_good
=
1
;
else
*
ret
|=
DH_CHECK_INVALID_Q_VALUE
;
}
if
(
q_good
)
{
if
(
BN_cmp
(
dh
->
params
.
g
,
BN_value_one
())
<=
0
)
if
(
BN_cmp
(
dh
->
params
.
g
,
BN_value_one
())
<=
0
)
*
ret
|=
DH_NOT_SUITABLE_GENERATOR
;
*
ret
|=
DH_NOT_SUITABLE_GENERATOR
;
else
if
(
BN_cmp
(
dh
->
params
.
g
,
dh
->
params
.
p
)
>=
0
)
else
if
(
BN_cmp
(
dh
->
params
.
g
,
dh
->
params
.
p
)
>=
0
)
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录