Subject: CVS commit: [netbsd-3] src/crypto/dist/openssl/crypto/rsa
To: None <source-changes@NetBSD.org>
From: Geert Hendrickx <ghen@netbsd.org>
List: source-changes
Date: 09/08/2006 09:29:52
Module Name:	src
Committed By:	ghen
Date:		Fri Sep  8 09:29:52 UTC 2006

Modified Files:
	src/crypto/dist/openssl/crypto/rsa [netbsd-3]: rsa_sign.c

Log Message:
Pull up following revision(s) (requested by 1504 in ticket #adrianp):
	crypto/dist/openssl/crypto/rsa/rsa_sign.c: revision 1.2
	crypto/dist/openssl/crypto/rsa/rsa_sign.c: revision 1.3
Apply patch-CVE-2006-4339.txt
Daniel Bleichenbacher recently described an attack on PKCS #1 v1.5
signatures. If an RSA key with exponent 3 is used it may be possible
to forge a PKCS #1 v1.5 signature signed by that key. Implementations
may incorrectly verify the certificate if they are not checking for
excess data in the RSA exponentiation result of the signature.
Since there are CAs using exponent 3 in wide use, and PKCS #1 v1.5 is
used in X.509 certificates, all software that uses OpenSSL to verify
X.509 certificates is potentially vulnerable, as well as any other use
of PKCS #1 v1.5. This includes software that uses OpenSSL for SSL or
TLS.
Apply the third version of the patch from OpenSSL to address this issue.
- Small update to the patch for rsa_sign.c for backward compatability so
  the same patch can be applied to 0.9.[6-9]


To generate a diff of this commit:
cvs rdiff -r1.1.1.4 -r1.1.1.4.6.1 \
    src/crypto/dist/openssl/crypto/rsa/rsa_sign.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.