Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
home:Alexander_Naumov:SLE-12:Update
openssl
openssl-CVE-2017-3731.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File openssl-CVE-2017-3731.patch of Package openssl
commit 51d009043670a627d6abe66894126851cf3690e9 Author: Andy Polyakov <appro@openssl.org> Date: Thu Jan 19 00:17:30 2017 +0100 crypto/evp: harden RC4_MD5 cipher. Originally a crash in 32-bit build was reported CHACHA20-POLY1305 cipher. The crash is triggered by truncated packet and is result of excessive hashing to the edge of accessible memory (or bogus MAC value is produced if x86 MD5 assembly module is involved). Since hash operation is read-only it is not considered to be exploitable beyond a DoS condition. Thanks to Robert Święcki for report. CVE-2017-3731 Reviewed-by: Rich Salz <rsalz@openssl.org> Index: openssl-1.0.1g/crypto/evp/e_rc4_hmac_md5.c =================================================================== --- openssl-1.0.1g.orig/crypto/evp/e_rc4_hmac_md5.c 2017-02-01 17:38:08.888100492 +0100 +++ openssl-1.0.1g/crypto/evp/e_rc4_hmac_md5.c 2017-02-01 17:39:01.072955187 +0100 @@ -257,6 +257,8 @@ static int rc4_hmac_md5_ctrl(EVP_CIPHER_ if (!ctx->encrypt) { + if (len < MD5_DIGEST_LENGTH) + return -1; len -= MD5_DIGEST_LENGTH; p[arg-2] = len>>8; p[arg-1] = len;
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor