Pedro Monreal Gonzalez
8c598ed63d
* Add openssl-3-disable-hmac-hw-acceleration-with-engine-digest.patch * Add openssl-3-fix-hmac-digest-detection-s390x.patch * Add openssl-3-fix-memleak-s390x_HMAC_CTX_copy.patch - Add hardware acceleration for full AES-XTS jsc#PED-10273 * Add openssl-3-hw-acceleration-aes-xts-s390x.patch - Support MSA 12 SHA3 on s390x jsc#PED-10280 * Add openssl-3-add_EVP_DigestSqueeze_api.patch * Add openssl-3-support-multiple-sha3_squeeze_s390x.patch * Add openssl-3-add-xof-state-handling-s3_absorb.patch * Add openssl-3-fix-state-handling-sha3_absorb_s390x.patch * Add openssl-3-fix-state-handling-sha3_final_s390x.patch * Add openssl-3-fix-state-handling-shake_final_s390x.patch * Add openssl-3-fix-state-handling-keccak_final_s390x.patch * Add openssl-3-support-EVP_DigestSqueeze-in-digest-prov-s390x.patch * Add openssl-3-add-defines-CPACF-funcs.patch * Add openssl-3-add-hw-acceleration-hmac.patch * Add openssl-3-support-CPACF-sha3-shake-perf-improvement.patch * Add openssl-3-fix-s390x_sha3_absorb.patch * Add openssl-3-fix-s390x_shake_squeeze.patch - Update to 3.2.3: * Changes between 3.2.2 and 3.2.3: - Fixed possible denial of service in X.509 name checks. [CVE-2024-6119] - Fixed possible buffer overread in SSL_select_next_proto(). [CVE-2024-5535] * Changes between 3.2.1 and 3.2.2: - Fixed potential use after free after SSL_free_buffers() is called. [CVE-2024-4741] - Fixed an issue where checking excessively long DSA keys or parameters may OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=121
82 lines
2.7 KiB
Diff
82 lines
2.7 KiB
Diff
Index: openssl-3.2.3/crypto/ec/ec_lib.c
|
|
===================================================================
|
|
--- openssl-3.2.3.orig/crypto/ec/ec_lib.c
|
|
+++ openssl-3.2.3/crypto/ec/ec_lib.c
|
|
@@ -743,12 +743,16 @@ EC_POINT *EC_POINT_new(const EC_GROUP *g
|
|
|
|
void EC_POINT_free(EC_POINT *point)
|
|
{
|
|
+#ifdef FIPS_MODULE
|
|
+ EC_POINT_clear_free(point);
|
|
+#else
|
|
if (point == NULL)
|
|
return;
|
|
|
|
if (point->meth->point_finish != 0)
|
|
point->meth->point_finish(point);
|
|
OPENSSL_free(point);
|
|
+#endif
|
|
}
|
|
|
|
void EC_POINT_clear_free(EC_POINT *point)
|
|
Index: openssl-3.2.3/crypto/ffc/ffc_params.c
|
|
===================================================================
|
|
--- openssl-3.2.3.orig/crypto/ffc/ffc_params.c
|
|
+++ openssl-3.2.3/crypto/ffc/ffc_params.c
|
|
@@ -27,10 +27,10 @@ void ossl_ffc_params_init(FFC_PARAMS *pa
|
|
|
|
void ossl_ffc_params_cleanup(FFC_PARAMS *params)
|
|
{
|
|
- BN_free(params->p);
|
|
- BN_free(params->q);
|
|
- BN_free(params->g);
|
|
- BN_free(params->j);
|
|
+ BN_clear_free(params->p);
|
|
+ BN_clear_free(params->q);
|
|
+ BN_clear_free(params->g);
|
|
+ BN_clear_free(params->j);
|
|
OPENSSL_free(params->seed);
|
|
ossl_ffc_params_init(params);
|
|
}
|
|
Index: openssl-3.2.3/crypto/rsa/rsa_lib.c
|
|
===================================================================
|
|
--- openssl-3.2.3.orig/crypto/rsa/rsa_lib.c
|
|
+++ openssl-3.2.3/crypto/rsa/rsa_lib.c
|
|
@@ -159,8 +159,8 @@ void RSA_free(RSA *r)
|
|
CRYPTO_THREAD_lock_free(r->lock);
|
|
CRYPTO_FREE_REF(&r->references);
|
|
|
|
- BN_free(r->n);
|
|
- BN_free(r->e);
|
|
+ BN_clear_free(r->n);
|
|
+ BN_clear_free(r->e);
|
|
BN_clear_free(r->d);
|
|
BN_clear_free(r->p);
|
|
BN_clear_free(r->q);
|
|
Index: openssl-3.2.3/providers/implementations/kdfs/hkdf.c
|
|
===================================================================
|
|
--- openssl-3.2.3.orig/providers/implementations/kdfs/hkdf.c
|
|
+++ openssl-3.2.3/providers/implementations/kdfs/hkdf.c
|
|
@@ -117,7 +117,7 @@ static void kdf_hkdf_reset(void *vctx)
|
|
void *provctx = ctx->provctx;
|
|
|
|
ossl_prov_digest_reset(&ctx->digest);
|
|
- OPENSSL_free(ctx->salt);
|
|
+ OPENSSL_clear_free(ctx->salt, ctx->salt_len);
|
|
OPENSSL_free(ctx->prefix);
|
|
OPENSSL_free(ctx->label);
|
|
OPENSSL_clear_free(ctx->data, ctx->data_len);
|
|
Index: openssl-3.2.3/providers/implementations/kdfs/pbkdf2.c
|
|
===================================================================
|
|
--- openssl-3.2.3.orig/providers/implementations/kdfs/pbkdf2.c
|
|
+++ openssl-3.2.3/providers/implementations/kdfs/pbkdf2.c
|
|
@@ -90,7 +90,7 @@ static void *kdf_pbkdf2_new(void *provct
|
|
static void kdf_pbkdf2_cleanup(KDF_PBKDF2 *ctx)
|
|
{
|
|
ossl_prov_digest_reset(&ctx->digest);
|
|
- OPENSSL_free(ctx->salt);
|
|
+ OPENSSL_clear_free(ctx->salt, ctx->salt_len);
|
|
OPENSSL_clear_free(ctx->pass, ctx->pass_len);
|
|
memset(ctx, 0, sizeof(*ctx));
|
|
}
|