Pedro Monreal Gonzalez
79c28ad03b
- Security fix: [bsc#1213487, CVE-2023-3446] * Fix DH_check() excessive time with over sized modulus. * The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus ("p" parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. A new limit has been added to DH_check of 32,768 bits. Supplying a key/parameters with a modulus over this size will simply cause DH_check() to fail. * Add openssl-CVE-2023-3446.patch openssl-CVE-2023-3446-test.patch OBS-URL: https://build.opensuse.org/request/show/1099662 OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=68 |
||
---|---|---|
.gitattributes | ||
.gitignore | ||
baselibs.conf | ||
openssl-3.1.1.tar.gz | ||
openssl-3.1.1.tar.gz.asc | ||
openssl-3.changes | ||
openssl-3.spec | ||
openssl-Add_support_for_Windows_CA_certificate_store.patch | ||
openssl-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch | ||
openssl-CVE-2023-2975.patch | ||
openssl-CVE-2023-3446-test.patch | ||
openssl-CVE-2023-3446.patch | ||
openssl-DEFAULT_SUSE_cipher.patch | ||
openssl-no-date.patch | ||
openssl-no-html-docs.patch | ||
openssl-Override-default-paths-for-the-CA-directory-tree.patch | ||
openssl-pkgconfig.patch | ||
openssl-ppc64-config.patch | ||
openssl-truststore.patch | ||
openssl-z16-s390x.patch | ||
openssl.keyring | ||
showciphers.c |