• M
    Fix DH_check() excessive time with over sized modulus · 9a81b024
    Matt Caswell 提交于
    The DH_check() function checks numerous aspects of the key or parameters
    that have been supplied. Some of those checks use the supplied modulus
    value even if it is excessively large.
    
    There is already a maximum DH modulus size (10,000 bits) over which
    OpenSSL will not generate or derive keys. DH_check() will however still
    perform various tests for validity on such a large modulus. We introduce a
    new maximum (32,768) over which DH_check() will just fail.
    
    An application that calls DH_check() and supplies a key or parameters
    obtained from an untrusted source could be vulnerable to a Denial of
    Service attack.
    
    The function DH_check() is itself called by a number of other OpenSSL
    functions. An application calling any of those other functions may
    similarly be affected. The other functions affected by this are
    DH_check_ex() and EVP_PKEY_param_check().
    
    CVE-2023-3446
    Reviewed-by: NPaul Dale <pauli@openssl.org>
    Reviewed-by: NTom Cosgrove <tom.cosgrove@arm.com>
    Reviewed-by: NBernd Edlinger <bernd.edlinger@hotmail.de>
    Reviewed-by: NTomas Mraz <tomas@openssl.org>
    (Merged from https://github.com/openssl/openssl/pull/21451)
    
    (cherry picked from commit 9e0094e2aa1b3428a12d5095132f133c078d3c3d)
    Signed-off-by: Ncode4lala <fengziteng2@huawei.com>
    9a81b024
dh_check.c 9.3 KB