Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package openssl-3 for openSUSE:Factory 
checked in at 2024-09-25 21:51:14
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/openssl-3 (Old)
 and      /work/SRC/openSUSE:Factory/.openssl-3.new.29891 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "openssl-3"

Wed Sep 25 21:51:14 2024 rev:30 rq:1202944 version:3.1.4

Changes:
--------
--- /work/SRC/openSUSE:Factory/openssl-3/openssl-3.changes      2024-09-05 
15:45:59.753108966 +0200
+++ /work/SRC/openSUSE:Factory/.openssl-3.new.29891/openssl-3.changes   
2024-09-25 21:51:16.195233734 +0200
@@ -1,0 +2,7 @@
+Thu Sep 19 08:05:52 UTC 2024 - Angel Yankov <angel.yan...@suse.com>
+
+- Security fix: [bsc#1230698, CVE-2024-41996] 
+  * Validating the order of the public keys in the Diffie-Hellman Key 
Agreement Protocol, when an approved safe prime is used
+  * Added openssl-CVE-2024-41996.patch
+
+-------------------------------------------------------------------

New:
----
  openssl-CVE-2024-41996.patch

BETA DEBUG BEGIN:
  New:  * Validating the order of the public keys in the Diffie-Hellman Key 
Agreement Protocol, when an approved safe prime is used
  * Added openssl-CVE-2024-41996.patch
BETA DEBUG END:

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ openssl-3.spec ++++++
--- /var/tmp/diff_new_pack.t1HfXj/_old  2024-09-25 21:51:17.463286553 +0200
+++ /var/tmp/diff_new_pack.t1HfXj/_new  2024-09-25 21:51:17.467286720 +0200
@@ -167,6 +167,9 @@
 Patch70:        openssl-3-FIPS-Deny-SHA-1-sigver-in-FIPS-provider.patch
 # PATCH-FIX-UPSTREAM bsc#1229465 CVE-2024-6119: possible denial of service in 
X.509 name checks
 Patch71:        openssl-CVE-2024-6119.patch
+# PATCH-FIX-UPSTREAM bsc#1230698 CVE-2024-41996:  Validating the order of the 
public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe 
prime is used, allows remote attackers to trigger expensive server-side DHE
+Patch72:        openssl-CVE-2024-41996.patch
+
 BuildRequires:  pkgconfig
 %if 0%{?sle_version} >= 150400 || 0%{?suse_version} >= 1550
 BuildRequires:  ulp-macros


++++++ openssl-CVE-2024-41996.patch ++++++
>From e70e34d857d4003199bcb5d3b52ca8102ccc1b98 Mon Sep 17 00:00:00 2001
From: Tomas Mraz <to...@openssl.org>
Date: Mon, 5 Aug 2024 17:54:14 +0200
Subject: [PATCH] dh_kmgmt.c: Avoid expensive public key validation for known
 safe-prime groups
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

The partial validation is fully sufficient to check the key validity.

Thanks to Szilárd Pfeiffer for reporting the issue.

Reviewed-by: Neil Horman <nhor...@openssl.org>
Reviewed-by: Matt Caswell <m...@openssl.org>
Reviewed-by: Paul Dale <ppz...@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/25088)
---
 providers/implementations/keymgmt/dh_kmgmt.c | 8 +++++---
 1 file changed, 5 insertions(+), 3 deletions(-)

diff --git a/providers/implementations/keymgmt/dh_kmgmt.c 
b/providers/implementations/keymgmt/dh_kmgmt.c
index 82c3093b122c2..ebdce767102ee 100644
--- a/providers/implementations/keymgmt/dh_kmgmt.c
+++ b/providers/implementations/keymgmt/dh_kmgmt.c
@@ -388,9 +388,11 @@ static int dh_validate_public(const DH *dh, int checktype)
     if (pub_key == NULL)
         return 0;
 
-    /* The partial test is only valid for named group's with q = (p - 1) / 2 */
-    if (checktype == OSSL_KEYMGMT_VALIDATE_QUICK_CHECK
-        && ossl_dh_is_named_safe_prime_group(dh))
+    /*
+     * The partial test is only valid for named group's with q = (p - 1) / 2
+     * but for that case it is also fully sufficient to check the key validity.
+     */
+    if (ossl_dh_is_named_safe_prime_group(dh))
         return ossl_dh_check_pub_key_partial(dh, pub_key, &res);
 
     return DH_check_pub_key_ex(dh, pub_key);

Reply via email to