File _patchinfo of Package patchinfo.29205

<patchinfo incident="29205">
  <issue tracker="bnc" id="1201627">openssl-1_0_0 FTBFS 2023-05-26</issue>
  <issue tracker="bnc" id="1207534">VUL-0: CVE-2022-4304: openssl: Timing Oracle in RSA Decryption</issue>
  <issue tracker="bnc" id="1213487">VUL-0: CVE-2023-3446: openssl-1_1,openssl1,openssl-3,openssl-1_0_0: Excessive time spent checking DH keys and parameters</issue>
  <issue tracker="cve" id="2022-4304"/>
  <issue tracker="cve" id="2023-3446"/>
  <packager>ohollmann</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for compat-openssl098</summary>
  <description>This update for compat-openssl098 fixes the following issues:

- CVE-2022-4304: Reworked the fix for the Timing-Oracle in RSA decryption.
  The previous fix for this timing side channel turned out to cause a
  severe 2-3x performance regression in the typical use case (bsc#1207534).

- CVE-2023-3446: Fixed DH_check() excessive time with over sized modulus (bsc#1213487).
    
- Update further expiring certificates that affect tests (bsc#1201627).
</description>
</patchinfo>
openSUSE Build Service is sponsored by