Skip to content
  1. Mar 07, 2019
    • Bernd Edlinger's avatar
      Limit DEVRANDOM_WAIT to linux · 596521f4
      Bernd Edlinger authored
      
      
      Fixes #8416
      
      Reviewed-by: default avatarKurt Roeckx <kurt@roeckx.be>
      (Merged from https://github.com/openssl/openssl/pull/8428)
      596521f4
    • Matt Caswell's avatar
      Add a test for underflow in ecp_nistp521.c · 6855b496
      Matt Caswell authored
      
      
      The previous commit fixed an underflow that may occur in ecp_nistp521.c.
      This commit adds a test for that condition. It is heavily based on an
      original test harness by Billy Brumley.
      
      Reviewed-by: default avatarNicola Tuveri <nic.tuv@gmail.com>
      (Merged from https://github.com/openssl/openssl/pull/8405)
      6855b496
    • Matt Caswell's avatar
      Avoid an underflow in ecp_nistp521.c · 13fbce17
      Matt Caswell authored
      
      
      The function felem_diff_128_64 in ecp_nistp521.c substracts the number |in|
      from |out| mod p. In order to avoid underflow it first adds 32p mod p
      (which is equivalent to 0 mod p) to |out|. The comments and variable naming
      suggest that the original author intended to add 64p mod p. In fact it
      has been shown that with certain unusual co-ordinates it is possible to
      cause an underflow in this function when only adding 32p mod p while
      performing a point double operation. By changing this to 64p mod p the
      underflow is avoided.
      
      It turns out to be quite difficult to construct points that satisfy the
      underflow criteria although this has been done and the underflow
      demonstrated. However none of these points are actually on the curve.
      Finding points that satisfy the underflow criteria and are also *on* the
      curve is considered significantly more difficult. For this reason we do
      not believe that this issue is currently practically exploitable and
      therefore no CVE has been assigned.
      
      This only impacts builds using the enable-ec_nistp_64_gcc_128 Configure
      option.
      
      With thanks to Bo-Yin Yang, Billy Brumley and Dr Liu for their significant
      help in investigating this issue.
      
      Reviewed-by: default avatarNicola Tuveri <nic.tuv@gmail.com>
      (Merged from https://github.com/openssl/openssl/pull/8405)
      13fbce17
  2. Mar 06, 2019
  3. Mar 05, 2019
  4. Mar 04, 2019
  5. Mar 01, 2019