1. 20 7月, 2023 1 次提交
    • M
      Fix DH_check() excessive time with over sized modulus · 9a81b024
      Matt Caswell 提交于
      The DH_check() function checks numerous aspects of the key or parameters
      that have been supplied. Some of those checks use the supplied modulus
      value even if it is excessively large.
      
      There is already a maximum DH modulus size (10,000 bits) over which
      OpenSSL will not generate or derive keys. DH_check() will however still
      perform various tests for validity on such a large modulus. We introduce a
      new maximum (32,768) over which DH_check() will just fail.
      
      An application that calls DH_check() and supplies a key or parameters
      obtained from an untrusted source could be vulnerable to a Denial of
      Service attack.
      
      The function DH_check() is itself called by a number of other OpenSSL
      functions. An application calling any of those other functions may
      similarly be affected. The other functions affected by this are
      DH_check_ex() and EVP_PKEY_param_check().
      
      CVE-2023-3446
      Reviewed-by: NPaul Dale <pauli@openssl.org>
      Reviewed-by: NTom Cosgrove <tom.cosgrove@arm.com>
      Reviewed-by: NBernd Edlinger <bernd.edlinger@hotmail.de>
      Reviewed-by: NTomas Mraz <tomas@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/21451)
      
      (cherry picked from commit 9e0094e2aa1b3428a12d5095132f133c078d3c3d)
      Signed-off-by: Ncode4lala <fengziteng2@huawei.com>
      9a81b024
  2. 02 6月, 2023 1 次提交
    • R
      Restrict the size of OBJECT IDENTIFIERs that OBJ_obj2txt will translate · b436274c
      Richard Levitte 提交于
      OBJ_obj2txt() would translate any size OBJECT IDENTIFIER to canonical
      numeric text form.  For gigantic sub-identifiers, this would take a very
      long time, the time complexity being O(n^2) where n is the size of that
      sub-identifier.
      
      To mitigate this, a restriction on the size that OBJ_obj2txt() will
      translate to canonical numeric text form is added, based on RFC 2578
      (STD 58), which says this:
      
      > 3.5. OBJECT IDENTIFIER values
      >
      > An OBJECT IDENTIFIER value is an ordered list of non-negative numbers.
      > For the SMIv2, each number in the list is referred to as a sub-identifier,
      > there are at most 128 sub-identifiers in a value, and each sub-identifier
      > has a maximum value of 2^32-1 (4294967295 decimal).
      
      Fixes otc/security#96
      Fixes CVE-2023-2650
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      Reviewed-by: NTomas Mraz <tomas@openssl.org>
      Signed-off-by: Ncode4lala <fengziteng2@huawei.com>
      b436274c
  3. 26 4月, 2023 12 次提交
  4. 12 4月, 2023 2 次提交
  5. 29 3月, 2023 1 次提交
  6. 24 3月, 2023 1 次提交
  7. 10 2月, 2023 4 次提交
  8. 11 7月, 2022 1 次提交
  9. 01 7月, 2022 1 次提交
  10. 25 6月, 2022 1 次提交
  11. 23 6月, 2022 1 次提交
  12. 17 3月, 2022 1 次提交
  13. 08 3月, 2022 1 次提交
  14. 30 1月, 2022 1 次提交
  15. 02 9月, 2021 1 次提交
  16. 10 8月, 2021 1 次提交
  17. 29 6月, 2021 1 次提交
    • H
      兼容MUSL · a18502d4
      HJ 提交于
      a18502d4
  18. 11 3月, 2021 1 次提交
  19. 09 9月, 2020 1 次提交
  20. 01 6月, 2020 1 次提交
  21. 31 5月, 2020 1 次提交
  22. 20 5月, 2020 1 次提交
  23. 31 3月, 2020 1 次提交
  24. 25 3月, 2020 1 次提交
  25. 23 3月, 2020 1 次提交