]> git.ipfire.org Git - thirdparty/openssl.git/commit
Check DSA parameters for excessive sizes before validating
authorTomas Mraz <tomas@openssl.org>
Wed, 8 May 2024 13:23:45 +0000 (15:23 +0200)
committerTomas Mraz <tomas@openssl.org>
Thu, 16 May 2024 13:44:40 +0000 (15:44 +0200)
commit85ccbab216da245cf9a6503dd327072f21950d9b
treeb2518208ea27de7e33675915ea36f1695a21c194
parente91579db0972bc8fe89e1060369c58f3dcfaafe7
Check DSA parameters for excessive sizes before validating

This avoids overly long computation of various validation
checks.

Fixes CVE-2024-4603

Reviewed-by: Paul Dale <ppzgs1@gmail.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/24346)
CHANGES.md
crypto/dsa/dsa_check.c
test/recipes/15-test_dsaparam_data/invalid/p10240_q256_too_big.pem [new file with mode: 0644]