forked from pool/openssl
This commit is contained in:
parent
3495fdf026
commit
4b865a26e1
114
openssl-CVE-2007-3108-bug296511.diff
Normal file
114
openssl-CVE-2007-3108-bug296511.diff
Normal file
@ -0,0 +1,114 @@
|
|||||||
|
--- crypto/bn/bn_mont.c
|
||||||
|
+++ crypto/bn/bn_mont.c 2007-08-02 11:49:15.251420366 +0200
|
||||||
|
@@ -176,7 +176,6 @@ int BN_from_montgomery(BIGNUM *ret, cons
|
||||||
|
|
||||||
|
max=(nl+al+1); /* allow for overflow (no?) XXX */
|
||||||
|
if (bn_wexpand(r,max) == NULL) goto err;
|
||||||
|
- if (bn_wexpand(ret,max) == NULL) goto err;
|
||||||
|
|
||||||
|
r->neg=a->neg^n->neg;
|
||||||
|
np=n->d;
|
||||||
|
@@ -228,19 +227,70 @@ int BN_from_montgomery(BIGNUM *ret, cons
|
||||||
|
}
|
||||||
|
bn_correct_top(r);
|
||||||
|
|
||||||
|
- /* mont->ri will be a multiple of the word size */
|
||||||
|
-#if 0
|
||||||
|
- BN_rshift(ret,r,mont->ri);
|
||||||
|
-#else
|
||||||
|
- ret->neg = r->neg;
|
||||||
|
- x=ri;
|
||||||
|
+ /* mont->ri will be a multiple of the word size and below code
|
||||||
|
+ * is kind of BN_rshift(ret,r,mont->ri) equivalent */
|
||||||
|
+ if (r->top <= ri)
|
||||||
|
+ {
|
||||||
|
+ ret->top=0;
|
||||||
|
+ retn=1;
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+ al=r->top-ri;
|
||||||
|
+
|
||||||
|
+# define BRANCH_FREE 1
|
||||||
|
+# if BRANCH_FREE
|
||||||
|
+ if (bn_wexpand(ret,ri) == NULL) goto err;
|
||||||
|
+ x=0-(((al-ri)>>(sizeof(al)*8-1))&1);
|
||||||
|
+ ret->top=x=(ri&~x)|(al&x); /* min(ri,al) */
|
||||||
|
+ ret->neg=r->neg;
|
||||||
|
+
|
||||||
|
rp=ret->d;
|
||||||
|
- ap= &(r->d[x]);
|
||||||
|
- if (r->top < x)
|
||||||
|
- al=0;
|
||||||
|
- else
|
||||||
|
- al=r->top-x;
|
||||||
|
+ ap=&(r->d[ri]);
|
||||||
|
+
|
||||||
|
+ {
|
||||||
|
+ size_t m1,m2;
|
||||||
|
+
|
||||||
|
+ v=bn_sub_words(rp,ap,np,ri);
|
||||||
|
+ /* this ----------------^^ works even in al<ri case
|
||||||
|
+ * thanks to zealous zeroing of top of the vector in the
|
||||||
|
+ * beginning. */
|
||||||
|
+
|
||||||
|
+ /* if (al==ri && !v) || al>ri) nrp=rp; else nrp=ap; */
|
||||||
|
+ /* in other words if subtraction result is real, then
|
||||||
|
+ * trick unconditional memcpy below to perform in-place
|
||||||
|
+ * "refresh" instead of actual copy. */
|
||||||
|
+ m1=0-(size_t)(((al-ri)>>(sizeof(al)*8-1))&1); /* al<ri */
|
||||||
|
+ m2=0-(size_t)(((ri-al)>>(sizeof(al)*8-1))&1); /* al>ri */
|
||||||
|
+ m1|=m2; /* (al!=ri) */
|
||||||
|
+ m1|=(0-(size_t)v); /* (al!=ri || v) */
|
||||||
|
+ m1&=~m2; /* (al!=ri || v) && !al>ri */
|
||||||
|
+ nrp=(BN_ULONG *)(((size_t)rp&~m1)|((size_t)ap&m1));
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ /* 'i<ri' is chosen to eliminate dependency on input data, even
|
||||||
|
+ * though it results in redundant copy in al<ri case. */
|
||||||
|
+ for (i=0,ri-=4; i<ri; i+=4)
|
||||||
|
+ {
|
||||||
|
+ BN_ULONG t1,t2,t3,t4;
|
||||||
|
+
|
||||||
|
+ t1=nrp[i+0];
|
||||||
|
+ t2=nrp[i+1];
|
||||||
|
+ t3=nrp[i+2]; ap[i+0]=0;
|
||||||
|
+ t4=nrp[i+3]; ap[i+1]=0;
|
||||||
|
+ rp[i+0]=t1; ap[i+2]=0;
|
||||||
|
+ rp[i+1]=t2; ap[i+3]=0;
|
||||||
|
+ rp[i+2]=t3;
|
||||||
|
+ rp[i+3]=t4;
|
||||||
|
+ }
|
||||||
|
+ for (ri+=4; i<ri; i++)
|
||||||
|
+ rp[i]=nrp[i], ap[i]=0;
|
||||||
|
+# else
|
||||||
|
+ if (bn_wexpand(ret,al) == NULL) goto err;
|
||||||
|
ret->top=al;
|
||||||
|
+ ret->neg=r->neg;
|
||||||
|
+
|
||||||
|
+ rp=ret->d;
|
||||||
|
+ ap=&(r->d[ri]);
|
||||||
|
al-=4;
|
||||||
|
for (i=0; i<al; i+=4)
|
||||||
|
{
|
||||||
|
@@ -258,7 +308,7 @@ int BN_from_montgomery(BIGNUM *ret, cons
|
||||||
|
al+=4;
|
||||||
|
for (; i<al; i++)
|
||||||
|
rp[i]=ap[i];
|
||||||
|
-#endif
|
||||||
|
+# endif
|
||||||
|
#else /* !MONT_WORD */
|
||||||
|
BIGNUM *t1,*t2;
|
||||||
|
|
||||||
|
@@ -278,10 +328,12 @@ int BN_from_montgomery(BIGNUM *ret, cons
|
||||||
|
if (!BN_rshift(ret,t2,mont->ri)) goto err;
|
||||||
|
#endif /* MONT_WORD */
|
||||||
|
|
||||||
|
+#if !defined(BRANCH_FREE) || BRANCH_FREE==0
|
||||||
|
if (BN_ucmp(ret, &(mont->N)) >= 0)
|
||||||
|
{
|
||||||
|
if (!BN_usub(ret,ret,&(mont->N))) goto err;
|
||||||
|
}
|
||||||
|
+#endif
|
||||||
|
retn=1;
|
||||||
|
bn_check_top(ret);
|
||||||
|
err:
|
@ -1,3 +1,14 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Aug 3 14:17:27 CEST 2007 - coolo@suse.de
|
||||||
|
|
||||||
|
- provide the version obsoleted (#293401)
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Aug 1 18:01:45 CEST 2007 - werner@suse.de
|
||||||
|
|
||||||
|
- Add patch from CVS for RSA key reconstruction vulnerability
|
||||||
|
(CVE-2007-3108, VU#724968, bug #296511)
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Thu May 24 16:18:50 CEST 2007 - mkoenig@suse.de
|
Thu May 24 16:18:50 CEST 2007 - mkoenig@suse.de
|
||||||
|
|
||||||
|
13
openssl.spec
13
openssl.spec
@ -14,12 +14,12 @@ Name: openssl
|
|||||||
BuildRequires: bc ed zlib-devel
|
BuildRequires: bc ed zlib-devel
|
||||||
%define ssletcdir %{_sysconfdir}/ssl
|
%define ssletcdir %{_sysconfdir}/ssl
|
||||||
%define num_version %(echo "%{version}" | sed -e "s+[a-zA-Z]++g; s+_.*++g")
|
%define num_version %(echo "%{version}" | sed -e "s+[a-zA-Z]++g; s+_.*++g")
|
||||||
License: BSD License and BSD-like
|
License: BSD 3-Clause
|
||||||
Group: Productivity/Networking/Security
|
Group: Productivity/Networking/Security
|
||||||
Provides: ssl
|
Provides: ssl
|
||||||
Autoreqprov: on
|
Autoreqprov: on
|
||||||
Version: 0.9.8e
|
Version: 0.9.8e
|
||||||
Release: 25
|
Release: 32
|
||||||
Summary: Secure Sockets and Transport Layer Security
|
Summary: Secure Sockets and Transport Layer Security
|
||||||
URL: http://www.openssl.org/
|
URL: http://www.openssl.org/
|
||||||
Source: http://www.%{name}.org/source/%{name}-%{version}.tar.bz2
|
Source: http://www.%{name}.org/source/%{name}-%{version}.tar.bz2
|
||||||
@ -29,6 +29,7 @@ Source21: Equifax-root1.pem
|
|||||||
Patch0: openssl-0.9.8-sparc.dif
|
Patch0: openssl-0.9.8-sparc.dif
|
||||||
Patch1: openssl-0.9.8-flags-priority.dif
|
Patch1: openssl-0.9.8-flags-priority.dif
|
||||||
Patch2: non-exec-stack.diff
|
Patch2: non-exec-stack.diff
|
||||||
|
Patch4: openssl-CVE-2007-3108-bug296511.diff
|
||||||
Patch7: openssl-0.9.7f-ppc64.diff
|
Patch7: openssl-0.9.7f-ppc64.diff
|
||||||
Patch8: openssl-hppa-config.diff
|
Patch8: openssl-hppa-config.diff
|
||||||
Patch9: openssl-0.9.6g-alpha.diff
|
Patch9: openssl-0.9.6g-alpha.diff
|
||||||
@ -111,7 +112,7 @@ Group: Development/Libraries/C and C++
|
|||||||
# openssl-devel last used in openSUSE 10.2
|
# openssl-devel last used in openSUSE 10.2
|
||||||
Obsoletes: openssl-devel <= 0.9.8e-8
|
Obsoletes: openssl-devel <= 0.9.8e-8
|
||||||
Requires: libopenssl0_9_8 = %{version} zlib-devel
|
Requires: libopenssl0_9_8 = %{version} zlib-devel
|
||||||
Provides: openssl-devel = %{version}-%{release}
|
Provides: openssl-devel = 0.9.8e-8
|
||||||
|
|
||||||
%description -n libopenssl-devel
|
%description -n libopenssl-devel
|
||||||
This package contains all necessary include files and libraries needed
|
This package contains all necessary include files and libraries needed
|
||||||
@ -189,6 +190,7 @@ Authors:
|
|||||||
%patch -p1
|
%patch -p1
|
||||||
%patch1 -p1
|
%patch1 -p1
|
||||||
%patch2
|
%patch2
|
||||||
|
%patch4
|
||||||
%patch7 -p1
|
%patch7 -p1
|
||||||
%patch8
|
%patch8
|
||||||
%patch9 -p1
|
%patch9 -p1
|
||||||
@ -413,6 +415,11 @@ if ! test -f /.buildenv; then rm -rf $RPM_BUILD_ROOT; fi
|
|||||||
%{ssletcdir}/certs
|
%{ssletcdir}/certs
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Fri Aug 03 2007 - coolo@suse.de
|
||||||
|
- provide the version obsoleted (#293401)
|
||||||
|
* Wed Aug 01 2007 - werner@suse.de
|
||||||
|
- Add patch from CVS for RSA key reconstruction vulnerability
|
||||||
|
(CVE-2007-3108, VU#724968, bug #296511)
|
||||||
* Thu May 24 2007 - mkoenig@suse.de
|
* Thu May 24 2007 - mkoenig@suse.de
|
||||||
- fix build with gcc-4.2
|
- fix build with gcc-4.2
|
||||||
openssl-gcc42.patch
|
openssl-gcc42.patch
|
||||||
|
Loading…
x
Reference in New Issue
Block a user