Hello community,
here is the log from the commit of package openssl
checked in at Fri Aug 3 15:49:45 CEST 2007.
--------
--- openssl/openssl.changes 2007-05-24 16:20:03.000000000 +0200
+++ /mounts/work_src_done/STABLE/openssl/openssl.changes 2007-08-03 14:17:46.048514000 +0200
@@ -1,0 +2,11 @@
+Fri Aug 3 14:17:27 CEST 2007 - coolo@suse.de
+
+- provide the version obsoleted (#293401)
+
+-------------------------------------------------------------------
+Wed Aug 1 18:01:45 CEST 2007 - werner@suse.de
+
+- Add patch from CVS for RSA key reconstruction vulnerability
+ (CVE-2007-3108, VU#724968, bug #296511)
+
+-------------------------------------------------------------------
New:
----
openssl-CVE-2007-3108-bug296511.diff
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ openssl.spec ++++++
--- /var/tmp/diff_new_pack.V27153/_old 2007-08-03 15:49:28.000000000 +0200
+++ /var/tmp/diff_new_pack.V27153/_new 2007-08-03 15:49:28.000000000 +0200
@@ -14,12 +14,12 @@
BuildRequires: bc ed zlib-devel
%define ssletcdir %{_sysconfdir}/ssl
%define num_version %(echo "%{version}" | sed -e "s+[a-zA-Z]++g; s+_.*++g")
-License: BSD License and BSD-like
+License: BSD 3-Clause
Group: Productivity/Networking/Security
Provides: ssl
Autoreqprov: on
Version: 0.9.8e
-Release: 25
+Release: 32
Summary: Secure Sockets and Transport Layer Security
URL: http://www.openssl.org/
Source: http://www.%{name}.org/source/%{name}-%{version}.tar.bz2
@@ -29,6 +29,7 @@
Patch0: openssl-0.9.8-sparc.dif
Patch1: openssl-0.9.8-flags-priority.dif
Patch2: non-exec-stack.diff
+Patch4: openssl-CVE-2007-3108-bug296511.diff
Patch7: openssl-0.9.7f-ppc64.diff
Patch8: openssl-hppa-config.diff
Patch9: openssl-0.9.6g-alpha.diff
@@ -111,7 +112,7 @@
# openssl-devel last used in openSUSE 10.2
Obsoletes: openssl-devel <= 0.9.8e-8
Requires: libopenssl0_9_8 = %{version} zlib-devel
-Provides: openssl-devel = %{version}-%{release}
+Provides: openssl-devel = 0.9.8e-8
%description -n libopenssl-devel
This package contains all necessary include files and libraries needed
@@ -189,6 +190,7 @@
%patch -p1
%patch1 -p1
%patch2
+%patch4
%patch7 -p1
%patch8
%patch9 -p1
@@ -413,6 +415,11 @@
%{ssletcdir}/certs
%changelog
+* Fri Aug 03 2007 - coolo@suse.de
+- provide the version obsoleted (#293401)
+* Wed Aug 01 2007 - werner@suse.de
+- Add patch from CVS for RSA key reconstruction vulnerability
+ (CVE-2007-3108, VU#724968, bug #296511)
* Thu May 24 2007 - mkoenig@suse.de
- fix build with gcc-4.2
openssl-gcc42.patch
++++++ openssl-CVE-2007-3108-bug296511.diff ++++++
--- crypto/bn/bn_mont.c
+++ crypto/bn/bn_mont.c 2007-08-02 11:49:15.251420366 +0200
@@ -176,7 +176,6 @@ int BN_from_montgomery(BIGNUM *ret, cons
max=(nl+al+1); /* allow for overflow (no?) XXX */
if (bn_wexpand(r,max) == NULL) goto err;
- if (bn_wexpand(ret,max) == NULL) goto err;
r->neg=a->neg^n->neg;
np=n->d;
@@ -228,19 +227,70 @@ int BN_from_montgomery(BIGNUM *ret, cons
}
bn_correct_top(r);
- /* mont->ri will be a multiple of the word size */
-#if 0
- BN_rshift(ret,r,mont->ri);
-#else
- ret->neg = r->neg;
- x=ri;
+ /* mont->ri will be a multiple of the word size and below code
+ * is kind of BN_rshift(ret,r,mont->ri) equivalent */
+ if (r->top <= ri)
+ {
+ ret->top=0;
+ retn=1;
+ goto err;
+ }
+ al=r->top-ri;
+
+# define BRANCH_FREE 1
+# if BRANCH_FREE
+ if (bn_wexpand(ret,ri) == NULL) goto err;
+ x=0-(((al-ri)>>(sizeof(al)*8-1))&1);
+ ret->top=x=(ri&~x)|(al&x); /* min(ri,al) */
+ ret->neg=r->neg;
+
rp=ret->d;
- ap= &(r->d[x]);
- if (r->top < x)
- al=0;
- else
- al=r->top-x;
+ ap=&(r->d[ri]);
+
+ {
+ size_t m1,m2;
+
+ v=bn_sub_words(rp,ap,np,ri);
+ /* this ----------------^^ works even in al