Skip to content
  1. Feb 28, 2018
  2. Feb 23, 2018
  3. Feb 06, 2018
  4. Jan 09, 2018
  5. Jan 07, 2018
  6. May 11, 2017
  7. Feb 08, 2017
  8. Feb 07, 2017
  9. Jan 26, 2017
    • Andy Polyakov's avatar
      crypto/evp: harden AEAD ciphers. · 2198b3a5
      Andy Polyakov authored
      
      
      Originally a crash in 32-bit build was reported CHACHA20-POLY1305
      cipher. The crash is triggered by truncated packet and is result
      of excessive hashing to the edge of accessible memory. Since hash
      operation is read-only it is not considered to be exploitable
      beyond a DoS condition. Other ciphers were hardened.
      
      Thanks to Robert Święcki for report.
      
      CVE-2017-3731
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      2198b3a5
  10. Jan 25, 2017
  11. Oct 18, 2016
  12. Jul 16, 2016
  13. Jun 14, 2016
  14. May 24, 2016
  15. May 17, 2016
  16. May 02, 2016
  17. Apr 20, 2016
  18. Apr 13, 2016
  19. Mar 20, 2016
  20. Mar 18, 2016
  21. Feb 05, 2016
  22. Jan 12, 2016
  23. Dec 10, 2015
  24. Nov 09, 2015
  25. Aug 14, 2015
  26. Jul 06, 2015
  27. Jun 08, 2015
  28. Apr 30, 2015
    • Matt Caswell's avatar
      Sanity check EVP_CTRL_AEAD_TLS_AAD · c8269881
      Matt Caswell authored
      
      
      The various implementations of EVP_CTRL_AEAD_TLS_AAD expect a buffer of at
      least 13 bytes long. Add sanity checks to ensure that the length is at
      least that. Also add a new constant (EVP_AEAD_TLS1_AAD_LEN) to evp.h to
      represent this length. Thanks to Kevin Wojtysiak (Int3 Solutions) and
      Paramjot Oberoi (Int3 Solutions) for reporting this issue.
      
      Reviewed-by: default avatarAndy Polyakov <appro@openssl.org>
      c8269881
  29. Mar 28, 2015
  30. Feb 09, 2015
  31. Feb 02, 2015
  32. Jan 28, 2015
  33. Jan 22, 2015
  34. Jan 04, 2015
  35. Dec 08, 2014