File _patchinfo of Package patchinfo.29247
<patchinfo incident="29247">
<issue tracker="bnc" id="1205476">VUL-0: CVE-2022-40735: long exponents in Diffie-Hellman Key Agreement Protocol allow remote attackers to trigger expensive server-side DHE modular-exponentiation</issue>
<issue tracker="bnc" id="1210714">VUL-0: CVE-2023-1255: openssl-3: Input buffer over-read in AES-XTS implementation on 64 bit ARM</issue>
<issue tracker="bnc" id="1211430">VUL-0: CVE-2023-2650: openssl-3,openssl-1_1,compat-openssl098,openssl1,openssl-1_0_0,openssl: Possible DoS translating ASN.1 object identifiers</issue>
<issue tracker="cve" id="2023-1255"/>
<issue tracker="cve" id="2023-2650"/>
<issue tracker="cve" id="2022-40735"/>
<packager>ohollmann</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for openssl-3</summary>
<description>This update for openssl-3 fixes the following issues:
- Update to version 3.0.8 (bsc#1207541).
- CVE-2022-40735: Fixed remote trigger of expensive server-side DHE modular-exponentiation with long exponents in Diffie-Hellman Key Agreement Protocol (bsc#1205476).
- CVE-2023-1255: Fixed input buffer over-read in AES-XTS implementation on 64 bit ARM (bsc#1210714).
- CVE-2023-2650: Fixed possible DoS translating ASN.1 object identifiers (bsc#1211430).
</description>
</patchinfo>