Skip to content
  1. Feb 24, 2016
    • Emilia Kasper's avatar
      CVE-2016-0798: avoid memory leak in SRP · 259b664f
      Emilia Kasper authored
      
      
      The SRP user database lookup method SRP_VBASE_get_by_user had confusing
      memory management semantics; the returned pointer was sometimes newly
      allocated, and sometimes owned by the callee. The calling code has no
      way of distinguishing these two cases.
      
      Specifically, SRP servers that configure a secret seed to hide valid
      login information are vulnerable to a memory leak: an attacker
      connecting with an invalid username can cause a memory leak of around
      300 bytes per connection.
      
      Servers that do not configure SRP, or configure SRP but do not configure
      a seed are not vulnerable.
      
      In Apache, the seed directive is known as SSLSRPUnknownUserSeed.
      
      To mitigate the memory leak, the seed handling in SRP_VBASE_get_by_user
      is now disabled even if the user has configured a seed.
      
      Applications are advised to migrate to SRP_VBASE_get1_by_user. However,
      note that OpenSSL makes no strong guarantees about the
      indistinguishability of valid and invalid logins. In particular,
      computations are currently not carried out in constant time.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      259b664f
  2. Feb 23, 2016
  3. Feb 22, 2016
  4. Feb 19, 2016
  5. Feb 18, 2016
  6. Feb 16, 2016
  7. Feb 13, 2016
  8. Feb 12, 2016
  9. Feb 11, 2016
  10. Feb 10, 2016
  11. Feb 08, 2016
    • Matt Caswell's avatar
      Handle SSL_shutdown while in init more appropriately #2 · 64193c82
      Matt Caswell authored
      Previous commit f73c737c attempted to "fix" a problem with the way
      SSL_shutdown() behaved whilst in mid-handshake. The original behaviour had
      SSL_shutdown() return immediately having taken no action if called mid-
      handshake with a return value of 1 (meaning everything was shutdown
      successfully). In fact the shutdown has not been successful.
      
      Commit f73c737c
      
       changed that to send a close_notify anyway and then
      return. This seems to be causing some problems for some applications so
      perhaps a better (much simpler) approach is revert to the previous
      behaviour (no attempt at a shutdown), but return -1 (meaning the shutdown
      was not successful).
      
      This also fixes a bug where SSL_shutdown always returns 0 when shutdown
      *very* early in the handshake (i.e. we are still using SSLv23_method).
      
      Reviewed-by: default avatarViktor Dukhovni <viktor@openssl.org>
      64193c82
  12. Feb 06, 2016
  13. Feb 05, 2016
    • Viktor Dukhovni's avatar
      Fix missing ok=0 with locally blacklisted CAs · a3baa171
      Viktor Dukhovni authored
      
      
      Also in X509_verify_cert() avoid using "i" not only as a loop
      counter, but also as a trust outcome and as an error ordinal.
      
      Finally, make sure that all "goto end" jumps return an error, with
      "end" renamed to "err" accordingly.
      
      [ The 1.1.0 version of X509_verify_cert() is major rewrite,
        which addresses these issues in a more systemic way. ]
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      a3baa171
  14. Feb 04, 2016
  15. Feb 02, 2016
  16. Feb 01, 2016
  17. Jan 30, 2016
  18. Jan 29, 2016
  19. Jan 28, 2016