Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
566ce903
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
10
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
未验证
提交
566ce903
编写于
7月 18, 2023
作者:
O
openharmony_ci
提交者:
Gitee
7月 18, 2023
浏览文件
操作
浏览文件
下载
差异文件
!124 Fixes CVE-2023-2975
Merge pull request !124 from code4lala/Fixes_CVE-2023-2975
上级
4652121a
87518c9f
变更
3
隐藏空白更改
内联
并排
Showing
3 changed file
with
34 addition
and
7 deletion
+34
-7
CHANGES.md
CHANGES.md
+21
-0
NEWS.md
NEWS.md
+2
-0
providers/implementations/ciphers/cipher_aes_siv.c
providers/implementations/ciphers/cipher_aes_siv.c
+11
-7
未找到文件。
CHANGES.md
浏览文件 @
566ce903
...
@@ -28,6 +28,26 @@ breaking changes, and mappings for the large list of deprecated functions.
...
@@ -28,6 +28,26 @@ breaking changes, and mappings for the large list of deprecated functions.
[Migration guide]: https://github.com/openssl/openssl/tree/master/doc/man7/migration_guide.pod
[Migration guide]: https://github.com/openssl/openssl/tree/master/doc/man7/migration_guide.pod
* Do not ignore empty associated data entries with AES-SIV.
The AES-SIV algorithm allows for authentication of multiple associated
data entries along with the encryption. To authenticate empty data the
application has to call `EVP_EncryptUpdate()` (or `EVP_CipherUpdate()`)
with NULL pointer as the output buffer and 0 as the input buffer length.
The AES-SIV implementation in OpenSSL just returns success for such call
instead of performing the associated data authentication operation.
The empty data thus will not be authenticated. ([CVE-2023-2975])
Thanks to Juerg Wullschleger (Google) for discovering the issue.
The fix changes the authentication tag value and the ciphertext for
applications that use empty associated data entries with AES-SIV.
To decrypt data encrypted with previous versions of OpenSSL the application
has to skip calls to `EVP_DecryptUpdate()` for empty associated data
entries.
*Tomas Mraz*
* Mitigate for the time it takes for `OBJ_obj2txt` to translate gigantic
* Mitigate for the time it takes for `OBJ_obj2txt` to translate gigantic
OBJECT IDENTIFIER sub-identifiers to canonical numeric text form.
OBJECT IDENTIFIER sub-identifiers to canonical numeric text form.
...
@@ -19475,6 +19495,7 @@ ndif
...
@@ -19475,6 +19495,7 @@ ndif
<!-- Links -->
<!-- Links -->
[CVE-2023-2975]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2975
[CVE-2023-2650]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2650
[CVE-2023-2650]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2650
[CVE-2023-0466]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0466
[CVE-2023-0466]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0466
[CVE-2023-1255]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-1255
[CVE-2023-1255]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-1255
...
...
NEWS.md
浏览文件 @
566ce903
...
@@ -17,6 +17,7 @@ OpenSSL Releases
...
@@ -17,6 +17,7 @@ OpenSSL Releases
OpenSSL 3.0
OpenSSL 3.0
-----------
-----------
*
Do not ignore empty associated data entries with AES-SIV ([CVE-2023-2975])
*
Mitigate for very slow
`OBJ_obj2txt()`
performance with gigantic OBJECT
*
Mitigate for very slow
`OBJ_obj2txt()`
performance with gigantic OBJECT
IDENTIFIER sub-identities. ([CVE-2023-2650])
IDENTIFIER sub-identities. ([CVE-2023-2650])
*
Fixed documentation of X509_VERIFY_PARAM_add0_policy() ([CVE-2023-0466])
*
Fixed documentation of X509_VERIFY_PARAM_add0_policy() ([CVE-2023-0466])
...
@@ -1424,6 +1425,7 @@ OpenSSL 0.9.x
...
@@ -1424,6 +1425,7 @@ OpenSSL 0.9.x
<!-- Links -->
<!-- Links -->
[
CVE-2023-2975
]:
https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2975
[
CVE-2023-2650
]:
https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2650
[
CVE-2023-2650
]:
https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2650
[
CVE-2023-0466
]:
https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0466
[
CVE-2023-0466
]:
https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0466
[
CVE-2023-1255
]:
https://www.openssl.org/news/vulnerabilities.html#CVE-2023-1255
[
CVE-2023-1255
]:
https://www.openssl.org/news/vulnerabilities.html#CVE-2023-1255
...
...
providers/implementations/ciphers/cipher_aes_siv.c
浏览文件 @
566ce903
...
@@ -120,14 +120,18 @@ static int siv_cipher(void *vctx, unsigned char *out, size_t *outl,
...
@@ -120,14 +120,18 @@ static int siv_cipher(void *vctx, unsigned char *out, size_t *outl,
if
(
!
ossl_prov_is_running
())
if
(
!
ossl_prov_is_running
())
return
0
;
return
0
;
if
(
inl
==
0
)
{
/* Ignore just empty encryption/decryption call and not AAD. */
*
outl
=
0
;
if
(
out
!=
NULL
)
{
return
1
;
if
(
inl
==
0
)
{
}
if
(
outl
!=
NULL
)
*
outl
=
0
;
return
1
;
}
if
(
outsize
<
inl
)
{
if
(
outsize
<
inl
)
{
ERR_raise
(
ERR_LIB_PROV
,
PROV_R_OUTPUT_BUFFER_TOO_SMALL
);
ERR_raise
(
ERR_LIB_PROV
,
PROV_R_OUTPUT_BUFFER_TOO_SMALL
);
return
0
;
return
0
;
}
}
}
if
(
ctx
->
hw
->
cipher
(
ctx
,
out
,
in
,
inl
)
<=
0
)
if
(
ctx
->
hw
->
cipher
(
ctx
,
out
,
in
,
inl
)
<=
0
)
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录