Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package openssl-3 for openSUSE:Factory checked in at 2024-09-25 21:51:14 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/openssl-3 (Old) and /work/SRC/openSUSE:Factory/.openssl-3.new.29891 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "openssl-3" Wed Sep 25 21:51:14 2024 rev:30 rq:1202944 version:3.1.4 Changes: -------- --- /work/SRC/openSUSE:Factory/openssl-3/openssl-3.changes 2024-09-05 15:45:59.753108966 +0200 +++ /work/SRC/openSUSE:Factory/.openssl-3.new.29891/openssl-3.changes 2024-09-25 21:51:16.195233734 +0200 @@ -1,0 +2,7 @@ +Thu Sep 19 08:05:52 UTC 2024 - Angel Yankov <angel.yan...@suse.com> + +- Security fix: [bsc#1230698, CVE-2024-41996] + * Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used + * Added openssl-CVE-2024-41996.patch + +------------------------------------------------------------------- New: ---- openssl-CVE-2024-41996.patch BETA DEBUG BEGIN: New: * Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used * Added openssl-CVE-2024-41996.patch BETA DEBUG END: ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ openssl-3.spec ++++++ --- /var/tmp/diff_new_pack.t1HfXj/_old 2024-09-25 21:51:17.463286553 +0200 +++ /var/tmp/diff_new_pack.t1HfXj/_new 2024-09-25 21:51:17.467286720 +0200 @@ -167,6 +167,9 @@ Patch70: openssl-3-FIPS-Deny-SHA-1-sigver-in-FIPS-provider.patch # PATCH-FIX-UPSTREAM bsc#1229465 CVE-2024-6119: possible denial of service in X.509 name checks Patch71: openssl-CVE-2024-6119.patch +# PATCH-FIX-UPSTREAM bsc#1230698 CVE-2024-41996: Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers to trigger expensive server-side DHE +Patch72: openssl-CVE-2024-41996.patch + BuildRequires: pkgconfig %if 0%{?sle_version} >= 150400 || 0%{?suse_version} >= 1550 BuildRequires: ulp-macros ++++++ openssl-CVE-2024-41996.patch ++++++ >From e70e34d857d4003199bcb5d3b52ca8102ccc1b98 Mon Sep 17 00:00:00 2001 From: Tomas Mraz <to...@openssl.org> Date: Mon, 5 Aug 2024 17:54:14 +0200 Subject: [PATCH] dh_kmgmt.c: Avoid expensive public key validation for known safe-prime groups MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The partial validation is fully sufficient to check the key validity. Thanks to Szilárd Pfeiffer for reporting the issue. Reviewed-by: Neil Horman <nhor...@openssl.org> Reviewed-by: Matt Caswell <m...@openssl.org> Reviewed-by: Paul Dale <ppz...@gmail.com> (Merged from https://github.com/openssl/openssl/pull/25088) --- providers/implementations/keymgmt/dh_kmgmt.c | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/providers/implementations/keymgmt/dh_kmgmt.c b/providers/implementations/keymgmt/dh_kmgmt.c index 82c3093b122c2..ebdce767102ee 100644 --- a/providers/implementations/keymgmt/dh_kmgmt.c +++ b/providers/implementations/keymgmt/dh_kmgmt.c @@ -388,9 +388,11 @@ static int dh_validate_public(const DH *dh, int checktype) if (pub_key == NULL) return 0; - /* The partial test is only valid for named group's with q = (p - 1) / 2 */ - if (checktype == OSSL_KEYMGMT_VALIDATE_QUICK_CHECK - && ossl_dh_is_named_safe_prime_group(dh)) + /* + * The partial test is only valid for named group's with q = (p - 1) / 2 + * but for that case it is also fully sufficient to check the key validity. + */ + if (ossl_dh_is_named_safe_prime_group(dh)) return ossl_dh_check_pub_key_partial(dh, pub_key, &res); return DH_check_pub_key_ex(dh, pub_key);