]> git.ipfire.org Git - thirdparty/openssl.git/commit
Check DSA parameters for excessive sizes before validating
authorTomas Mraz <tomas@openssl.org>
Wed, 8 May 2024 13:23:45 +0000 (15:23 +0200)
committerTomas Mraz <tomas@openssl.org>
Thu, 16 May 2024 13:48:25 +0000 (15:48 +0200)
commit9c39b3858091c152f52513c066ff2c5a47969f0d
treee447458db23c350f76cd0138868a963fb3036b1a
parent0b49dded73a51687a4b1160031647be6c2152973
Check DSA parameters for excessive sizes before validating

This avoids overly long computation of various validation
checks.

Fixes CVE-2024-4603

Reviewed-by: Paul Dale <ppzgs1@gmail.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/24346)

(cherry picked from commit 85ccbab216da245cf9a6503dd327072f21950d9b)
CHANGES.md
crypto/dsa/dsa_check.c
test/recipes/15-test_dsaparam_data/invalid/p10240_q256_too_big.pem [new file with mode: 0644]