Skip to content
  1. Jan 26, 2017
    • Andy Polyakov's avatar
      crypto/evp: harden AEAD ciphers. · 00d96547
      Andy Polyakov authored
      
      
      Originally a crash in 32-bit build was reported CHACHA20-POLY1305
      cipher. The crash is triggered by truncated packet and is result
      of excessive hashing to the edge of accessible memory. Since hash
      operation is read-only it is not considered to be exploitable
      beyond a DoS condition. Other ciphers were hardened.
      
      Thanks to Robert Święcki for report.
      
      CVE-2017-3731
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      00d96547
    • Andy Polyakov's avatar
      crypto/evp: harden RC4_MD5 cipher. · f3a7e57c
      Andy Polyakov authored
      
      
      Originally a crash in 32-bit build was reported CHACHA20-POLY1305
      cipher. The crash is triggered by truncated packet and is result
      of excessive hashing to the edge of accessible memory (or bogus
      MAC value is produced if x86 MD5 assembly module is involved). Since
      hash operation is read-only it is not considered to be exploitable
      beyond a DoS condition.
      
      Thanks to Robert Święcki for report.
      
      CVE-2017-3731
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      f3a7e57c
  2. Jan 25, 2017
  3. Jan 24, 2017
  4. Jan 23, 2017
  5. Jan 20, 2017
  6. Jan 19, 2017
  7. Jan 18, 2017
  8. Jan 17, 2017
  9. Jan 16, 2017
  10. Jan 15, 2017