Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
882a3636
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
10
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
未验证
提交
882a3636
编写于
8月 07, 2023
作者:
O
openharmony_ci
提交者:
Gitee
8月 07, 2023
浏览文件
操作
浏览文件
下载
差异文件
!132 fix-CVE-2023-3817-for-OpenHarmony-3.0-LTS
Merge pull request !132 from code4lala/fix-CVE-2023-3817-for-OpenHarmony-3.0-LTS
上级
58dcbf4a
3501c550
变更
3
显示空白变更内容
内联
并排
Showing
3 changed file
with
26 addition
and
2 deletion
+26
-2
CHANGES
CHANGES
+16
-0
NEWS
NEWS
+1
-0
crypto/dh/dh_check.c
crypto/dh/dh_check.c
+9
-2
未找到文件。
CHANGES
浏览文件 @
882a3636
...
...
@@ -6,6 +6,22 @@
For a full list of changes, see the git commit log; for example,
https://github.com/openssl/openssl/commits/ and pick the appropriate
release branch.
*) Fix excessive time spent checking DH q parameter value.
The function DH_check() performs various checks on DH parameters. After
fixing CVE-2023-3446 it was discovered that a large q parameter value can
also trigger an overly long computation during some of these checks.
A correct q value, if present, cannot be larger than the modulus p
parameter, thus it is unnecessary to perform these checks if q is larger
than p.
If DH_check() is called with such q parameter value,
DH_CHECK_INVALID_Q_VALUE return flag is set and the computationally
intensive checks are skipped.
(CVE-2023-3817)
[Tomáš Mráz]
*) Fix DH_check() excessive time with over sized modulus
The function DH_check() performs various checks on DH parameters. One of
...
...
NEWS
浏览文件 @
882a3636
...
...
@@ -4,6 +4,7 @@
This file gives a brief overview of the major changes between each OpenSSL
release. For more details please read the CHANGES file.
o Fix excessive time spent checking DH q parameter value (CVE-2023-3817)
o Fix DH_check() excessive time with over sized modulus (CVE-2023-3446)
o Fixed documentation of X509_VERIFY_PARAM_add0_policy() (CVE-2023-0466)
o Mitigate for very slow `OBJ_obj2txt()` performance with gigantic
...
...
crypto/dh/dh_check.c
浏览文件 @
882a3636
...
...
@@ -97,7 +97,7 @@ int DH_check_ex(const DH *dh)
int
DH_check
(
const
DH
*
dh
,
int
*
ret
)
{
int
ok
=
0
,
r
;
int
ok
=
0
,
r
,
q_good
=
0
;
BN_CTX
*
ctx
=
NULL
;
BIGNUM
*
t1
=
NULL
,
*
t2
=
NULL
;
...
...
@@ -119,7 +119,14 @@ int DH_check(const DH *dh, int *ret)
if
(
t2
==
NULL
)
goto
err
;
if
(
dh
->
q
)
{
if
(
dh
->
q
!=
NULL
)
{
if
(
BN_ucmp
(
dh
->
p
,
dh
->
q
)
>
0
)
q_good
=
1
;
else
*
ret
|=
DH_CHECK_INVALID_Q_VALUE
;
}
if
(
q_good
)
{
if
(
BN_cmp
(
dh
->
g
,
BN_value_one
())
<=
0
)
*
ret
|=
DH_NOT_SUITABLE_GENERATOR
;
else
if
(
BN_cmp
(
dh
->
g
,
dh
->
p
)
>=
0
)
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录