Go to file
Pedro Monreal Gonzalez 79c28ad03b Accepting request 1099662 from home:pmonrealgonzalez:branches:security:tls
- Security fix: [bsc#1213487, CVE-2023-3446]
  * Fix DH_check() excessive time with over sized modulus.
  * The function DH_check() performs various checks on DH parameters.
    One of those checks confirms that the modulus ("p" parameter) is
    not too large. Trying to use a very large modulus is slow and
    OpenSSL will not normally use a modulus which is over 10,000 bits
    in length.
    However the DH_check() function checks numerous aspects of the
    key or parameters that have been supplied. Some of those checks
    use the supplied modulus value even if it has already been found
    to be too large.
    A new limit has been added to DH_check of 32,768 bits. Supplying
    a key/parameters with a modulus over this size will simply cause
    DH_check() to fail.
  * Add openssl-CVE-2023-3446.patch openssl-CVE-2023-3446-test.patch

OBS-URL: https://build.opensuse.org/request/show/1099662
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=68
2023-07-20 08:41:29 +00:00
.gitattributes Accepting request 796816 from home:vitezslav_cizek 2020-04-24 08:03:40 +00:00
.gitignore Accepting request 796816 from home:vitezslav_cizek 2020-04-24 08:03:40 +00:00
baselibs.conf Accepting request 1089847 from security:tls:unstable 2023-05-30 16:00:51 +00:00
openssl-3.1.1.tar.gz Accepting request 1089847 from security:tls:unstable 2023-05-30 16:00:51 +00:00
openssl-3.1.1.tar.gz.asc Accepting request 1089847 from security:tls:unstable 2023-05-30 16:00:51 +00:00
openssl-3.changes Accepting request 1099662 from home:pmonrealgonzalez:branches:security:tls 2023-07-20 08:41:29 +00:00
openssl-3.spec Accepting request 1099662 from home:pmonrealgonzalez:branches:security:tls 2023-07-20 08:41:29 +00:00
openssl-Add_support_for_Windows_CA_certificate_store.patch Accepting request 1089847 from security:tls:unstable 2023-05-30 16:00:51 +00:00
openssl-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch Accepting request 1089847 from security:tls:unstable 2023-05-30 16:00:51 +00:00
openssl-CVE-2023-2975.patch Accepting request 1099214 from home:pmonrealgonzalez:branches:security:tls 2023-07-18 09:07:15 +00:00
openssl-CVE-2023-3446-test.patch Accepting request 1099662 from home:pmonrealgonzalez:branches:security:tls 2023-07-20 08:41:29 +00:00
openssl-CVE-2023-3446.patch Accepting request 1099662 from home:pmonrealgonzalez:branches:security:tls 2023-07-20 08:41:29 +00:00
openssl-DEFAULT_SUSE_cipher.patch Accepting request 841985 from home:pmonrealgonzalez:branches:security:tls 2020-10-15 19:22:03 +00:00
openssl-no-date.patch Accepting request 796816 from home:vitezslav_cizek 2020-04-24 08:03:40 +00:00
openssl-no-html-docs.patch Accepting request 1062222 from security:tls:unstable 2023-01-31 12:15:10 +00:00
openssl-Override-default-paths-for-the-CA-directory-tree.patch Accepting request 962003 from home:pmonrealgonzalez:branches:security:tls 2022-03-15 19:28:22 +00:00
openssl-pkgconfig.patch Accepting request 796816 from home:vitezslav_cizek 2020-04-24 08:03:40 +00:00
openssl-ppc64-config.patch Accepting request 821489 from home:pmonrealgonzalez:branches:security:tls 2020-07-17 11:26:23 +00:00
openssl-truststore.patch Accepting request 796816 from home:vitezslav_cizek 2020-04-24 08:03:40 +00:00
openssl-z16-s390x.patch Accepting request 1074731 from home:ohollmann:branches:security:tls 2023-03-27 15:13:59 +00:00
openssl.keyring Accepting request 1089847 from security:tls:unstable 2023-05-30 16:00:51 +00:00
showciphers.c Accepting request 796816 from home:vitezslav_cizek 2020-04-24 08:03:40 +00:00