[openssl/openssl] 53ea06: Check DSA parameters for excessive sizes before va...
Tomáš Mráz
noreply at github.com
Thu May 16 13:47:05 UTC 2024
Branch: refs/heads/openssl-3.3
Home: https://github.com/openssl/openssl
Commit: 53ea06486d296b890d565fb971b2764fcd826e7e
https://github.com/openssl/openssl/commit/53ea06486d296b890d565fb971b2764fcd826e7e
Author: Tomas Mraz <tomas at openssl.org>
Date: 2024-05-16 (Thu, 16 May 2024)
Changed paths:
M CHANGES.md
M crypto/dsa/dsa_check.c
A test/recipes/15-test_dsaparam_data/invalid/p10240_q256_too_big.pem
Log Message:
-----------
Check DSA parameters for excessive sizes before validating
This avoids overly long computation of various validation
checks.
Fixes CVE-2024-4603
Reviewed-by: Paul Dale <ppzgs1 at gmail.com>
Reviewed-by: Matt Caswell <matt at openssl.org>
Reviewed-by: Neil Horman <nhorman at openssl.org>
Reviewed-by: Shane Lontis <shane.lontis at oracle.com>
(Merged from https://github.com/openssl/openssl/pull/24346)
(cherry picked from commit 85ccbab216da245cf9a6503dd327072f21950d9b)
To unsubscribe from these emails, change your notification settings at https://github.com/openssl/openssl/settings/notifications
More information about the openssl-commits
mailing list