- Update to 3.2.4:
* Fixed RFC7250 handshakes with unauthenticated servers don't abort as expected. [CVE-2024-12797] * Fixed timing side-channel in ECDSA signature computation. [CVE-2024-13176] * Fixed possible OOB memory access with invalid low-level GF(2^m) elliptic curve parameters. [CVE-2024-9143] - Remove patch openssl-CVE-2024-13176.patch - Rebase patches: * openssl-3-add_EVP_DigestSqueeze_api.patch * openssl-DH-Disable-FIPS-186-4-type-parameters-in-FIPS-mode.patch * openssl-FIPS-RSA-encapsulate.patch * openssl-disable-fipsinstall.patch OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=132
This commit is contained in:
@@ -9,15 +9,14 @@ Patch-id: 91
|
||||
providers/implementations/kem/rsa_kem.c | 15 +++++++++++++++
|
||||
1 file changed, 15 insertions(+)
|
||||
|
||||
diff --git a/providers/implementations/kem/rsa_kem.c b/providers/implementations/kem/rsa_kem.c
|
||||
index 365ae3d7d6..8a6f585d0b 100644
|
||||
--- a/providers/implementations/kem/rsa_kem.c
|
||||
+++ b/providers/implementations/kem/rsa_kem.c
|
||||
@@ -265,6 +265,14 @@ static int rsasve_generate(PROV_RSA_CTX *prsactx,
|
||||
*secretlen = nlen;
|
||||
return 1;
|
||||
Index: openssl-3.2.4/providers/implementations/kem/rsa_kem.c
|
||||
===================================================================
|
||||
--- openssl-3.2.4.orig/providers/implementations/kem/rsa_kem.c
|
||||
+++ openssl-3.2.4/providers/implementations/kem/rsa_kem.c
|
||||
@@ -276,6 +276,13 @@ static int rsasve_generate(PROV_RSA_CTX
|
||||
return 0;
|
||||
}
|
||||
+
|
||||
|
||||
+#ifdef FIPS_MODULE
|
||||
+ if (nlen < OPENSSL_RSA_FIPS_MIN_MODULUS_BITS/8) {
|
||||
+ ERR_raise(ERR_LIB_PROV, PROV_R_KEY_SIZE_TOO_SMALL);
|
||||
@@ -28,7 +27,7 @@ index 365ae3d7d6..8a6f585d0b 100644
|
||||
/*
|
||||
* Step (2): Generate a random byte string z of nlen bytes where
|
||||
* 1 < z < n - 1
|
||||
@@ -308,6 +316,13 @@ static int rsasve_recover(PROV_RSA_CTX *prsactx,
|
||||
@@ -337,6 +344,13 @@ static int rsasve_recover(PROV_RSA_CTX *
|
||||
return 1;
|
||||
}
|
||||
|
||||
@@ -39,9 +38,6 @@ index 365ae3d7d6..8a6f585d0b 100644
|
||||
+ }
|
||||
+#endif
|
||||
+
|
||||
/* Step (2): check the input ciphertext 'inlen' matches the nlen */
|
||||
if (inlen != nlen) {
|
||||
ERR_raise(ERR_LIB_PROV, PROV_R_BAD_LENGTH);
|
||||
--
|
||||
2.41.0
|
||||
|
||||
/*
|
||||
* Step (2): check the input ciphertext 'inlen' matches the nlen
|
||||
* and that outlen is at least nlen bytes
|
||||
|
Reference in New Issue
Block a user