import UBI compat-openssl11-1.1.1k-5.el9_6.1
This commit is contained in:
parent
1a293f5165
commit
467ce225d0
63
SOURCES/openssl-1.1.1-cve-2023-0286-X400.patch
Normal file
63
SOURCES/openssl-1.1.1-cve-2023-0286-X400.patch
Normal file
@ -0,0 +1,63 @@
|
|||||||
|
From 2c6c9d439b484e1ba9830d8454a34fa4f80fdfe9 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Hugo Landau <hlandau@openssl.org>
|
||||||
|
Date: Tue, 17 Jan 2023 17:45:42 +0000
|
||||||
|
Subject: [PATCH 6/6] CVE-2023-0286: Fix GENERAL_NAME_cmp for x400Address
|
||||||
|
(1.1.1)
|
||||||
|
|
||||||
|
Reviewed-by: Paul Dale <pauli@openssl.org>
|
||||||
|
Reviewed-by: Tomas Mraz <tomas@openssl.org>
|
||||||
|
---
|
||||||
|
CHANGES | 18 +++++++++++++++++-
|
||||||
|
crypto/x509v3/v3_genn.c | 2 +-
|
||||||
|
include/openssl/x509v3.h | 2 +-
|
||||||
|
test/v3nametest.c | 8 ++++++++
|
||||||
|
4 files changed, 27 insertions(+), 3 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/crypto/x509v3/v3_genn.c b/crypto/x509v3/v3_genn.c
|
||||||
|
index 87a5eff47c..e54ddc55c9 100644
|
||||||
|
--- a/crypto/x509v3/v3_genn.c
|
||||||
|
+++ b/crypto/x509v3/v3_genn.c
|
||||||
|
@@ -98,7 +98,7 @@ int GENERAL_NAME_cmp(GENERAL_NAME *a, GENERAL_NAME *b)
|
||||||
|
return -1;
|
||||||
|
switch (a->type) {
|
||||||
|
case GEN_X400:
|
||||||
|
- result = ASN1_TYPE_cmp(a->d.x400Address, b->d.x400Address);
|
||||||
|
+ result = ASN1_STRING_cmp(a->d.x400Address, b->d.x400Address);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case GEN_EDIPARTY:
|
||||||
|
diff --git a/include/openssl/x509v3.h b/include/openssl/x509v3.h
|
||||||
|
index 90fa3592ce..e61c0f29d4 100644
|
||||||
|
--- a/include/openssl/x509v3.h
|
||||||
|
+++ b/include/openssl/x509v3.h
|
||||||
|
@@ -136,7 +136,7 @@ typedef struct GENERAL_NAME_st {
|
||||||
|
OTHERNAME *otherName; /* otherName */
|
||||||
|
ASN1_IA5STRING *rfc822Name;
|
||||||
|
ASN1_IA5STRING *dNSName;
|
||||||
|
- ASN1_TYPE *x400Address;
|
||||||
|
+ ASN1_STRING *x400Address;
|
||||||
|
X509_NAME *directoryName;
|
||||||
|
EDIPARTYNAME *ediPartyName;
|
||||||
|
ASN1_IA5STRING *uniformResourceIdentifier;
|
||||||
|
diff --git a/test/v3nametest.c b/test/v3nametest.c
|
||||||
|
index d1852190b8..37819da8fd 100644
|
||||||
|
--- a/test/v3nametest.c
|
||||||
|
+++ b/test/v3nametest.c
|
||||||
|
@@ -646,6 +646,14 @@ static struct gennamedata {
|
||||||
|
0xb7, 0x09, 0x02, 0x02
|
||||||
|
},
|
||||||
|
15
|
||||||
|
+ }, {
|
||||||
|
+ /*
|
||||||
|
+ * Regression test for CVE-2023-0286.
|
||||||
|
+ */
|
||||||
|
+ {
|
||||||
|
+ 0xa3, 0x00
|
||||||
|
+ },
|
||||||
|
+ 2
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
--
|
||||||
|
2.39.1
|
||||||
|
|
1176
SOURCES/openssl-1.1.1-replace-expired-certs.patch
Normal file
1176
SOURCES/openssl-1.1.1-replace-expired-certs.patch
Normal file
File diff suppressed because it is too large
Load Diff
@ -22,7 +22,7 @@
|
|||||||
Summary: Utilities from the general purpose cryptography library with TLS implementation
|
Summary: Utilities from the general purpose cryptography library with TLS implementation
|
||||||
Name: compat-openssl11
|
Name: compat-openssl11
|
||||||
Version: 1.1.1k
|
Version: 1.1.1k
|
||||||
Release: 4%{?dist}
|
Release: 5%{?dist}.1
|
||||||
Epoch: 1
|
Epoch: 1
|
||||||
# We have to remove certain patented algorithms from the openssl source
|
# We have to remove certain patented algorithms from the openssl source
|
||||||
# tarball with the hobble-openssl script which is included below.
|
# tarball with the hobble-openssl script which is included below.
|
||||||
@ -76,6 +76,8 @@ Patch53: openssl-1.1.1-fips-crng-test.patch
|
|||||||
Patch55: openssl-1.1.1-arm-update.patch
|
Patch55: openssl-1.1.1-arm-update.patch
|
||||||
Patch56: openssl-1.1.1-s390x-ecc.patch
|
Patch56: openssl-1.1.1-s390x-ecc.patch
|
||||||
Patch73: openssl-1.1.1-cve-2022-0778.patch
|
Patch73: openssl-1.1.1-cve-2022-0778.patch
|
||||||
|
Patch83: openssl-1.1.1-replace-expired-certs.patch
|
||||||
|
Patch74: openssl-1.1.1-cve-2023-0286-X400.patch
|
||||||
|
|
||||||
License: OpenSSL and ASL 2.0
|
License: OpenSSL and ASL 2.0
|
||||||
URL: http://www.openssl.org/
|
URL: http://www.openssl.org/
|
||||||
@ -145,6 +147,8 @@ cp %{SOURCE13} test/
|
|||||||
%patch71 -p1 -b .conf-new
|
%patch71 -p1 -b .conf-new
|
||||||
%patch72 -p1 -b .disable-fips
|
%patch72 -p1 -b .disable-fips
|
||||||
%patch73 -p1 -b .cve-2022-0778
|
%patch73 -p1 -b .cve-2022-0778
|
||||||
|
%patch -P 83 -p1 -b .replace-expired-certs
|
||||||
|
%patch74 -p1 -b .cve-2023-0286
|
||||||
|
|
||||||
cp apps/openssl.cnf apps/openssl11.cnf
|
cp apps/openssl.cnf apps/openssl11.cnf
|
||||||
|
|
||||||
@ -313,11 +317,19 @@ install -m 644 apps/openssl11.cnf $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl1
|
|||||||
%ldconfig_scriptlets
|
%ldconfig_scriptlets
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Fri May 9 2025 Petr Hybl <phybl@redhat.com> - 1:1.1.1k-5.1
|
||||||
|
- Fixes cve-2023-0286 X.400 address type confusion in X.509 GeneralName
|
||||||
|
Resolves: RHEL-88969
|
||||||
|
|
||||||
|
* Thu Sep 21 2023 Clemens Lang <cllang@redhat.com> - 1:1.1.1k-5
|
||||||
|
- Update expired certificates used in the testsuite
|
||||||
|
Resolves: RHEL-5297
|
||||||
|
|
||||||
* Mon May 30 2022 Clemens Lang <cllang@redhat.com> - 1:1.1.1k-4
|
* Mon May 30 2022 Clemens Lang <cllang@redhat.com> - 1:1.1.1k-4
|
||||||
- Fixes CVE-2022-0778 openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
|
- Fixes CVE-2022-0778 openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
|
||||||
Resolves: rhbz#2063147
|
Resolves: rhbz#2063148
|
||||||
- Disable FIPS mode; it does not work and will not be certified
|
- Disable FIPS mode; it does not work and will not be certified
|
||||||
Resolves: rhbz#2091968
|
Resolves: rhbz#2013669
|
||||||
|
|
||||||
* Tue Oct 05 2021 Sahana Prasad <sahana@redhat.com> - 1:1.1.1k-3
|
* Tue Oct 05 2021 Sahana Prasad <sahana@redhat.com> - 1:1.1.1k-3
|
||||||
- updates OPENSSL_CONF to openssl11.cnf.
|
- updates OPENSSL_CONF to openssl11.cnf.
|
||||||
|
Loading…
Reference in New Issue
Block a user