1. 06 Jan, 2018 2 commits
  2. 05 Jan, 2018 1 commit
  3. 27 Dec, 2017 1 commit
  4. 23 Dec, 2017 1 commit
  5. 13 Dec, 2017 1 commit
  6. 11 Dec, 2017 1 commit
  7. 10 Dec, 2017 1 commit
  8. 09 Dec, 2017 1 commit
  9. 08 Dec, 2017 4 commits
  10. 07 Dec, 2017 6 commits
  11. 06 Dec, 2017 3 commits
    • Matt Caswell's avatar
      Add a test for CVE-2017-3737 · c7383fb5
      Matt Caswell authored
      
      
      Test reading/writing to an SSL object after a fatal error has been
      detected.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      c7383fb5
    • Matt Caswell's avatar
      Don't allow read/write after fatal error · 898fb884
      Matt Caswell authored
      
      
      OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state"
      mechanism. The intent was that if a fatal error occurred during a handshake
      then OpenSSL would move into the error state and would immediately fail if
      you attempted to continue the handshake. This works as designed for the
      explicit handshake functions (SSL_do_handshake(), SSL_accept() and
      SSL_connect()), however due to a bug it does not work correctly if
      SSL_read() or SSL_write() is called directly. In that scenario, if the
      handshake fails then a fatal error will be returned in the initial function
      call. If SSL_read()/SSL_write() is subsequently called by the application
      for the same SSL object then it will succeed and the data is passed without
      being decrypted/encrypted directly from the SSL/TLS record layer.
      
      In order to exploit this issue an attacker would have to trick an
      application into behaving incorrectly by issuing an SSL_read()/SSL_write()
      after having already received a fatal error.
      
      Thanks to David Benjamin (Google) for reporting this issue and suggesting
      this fix.
      
      CVE-2017-3737
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      898fb884
    • Andy Polyakov's avatar
      bn/asm/rsaz-avx2.pl: fix digit correction bug in rsaz_1024_mul_avx2. · ca51bafc
      Andy Polyakov authored
      
      
      Credit to OSS-Fuzz for finding this.
      
      CVE-2017-3738
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      ca51bafc
  12. 04 Dec, 2017 1 commit
  13. 30 Nov, 2017 1 commit
  14. 16 Nov, 2017 1 commit
  15. 14 Nov, 2017 1 commit
  16. 13 Nov, 2017 2 commits
  17. 11 Nov, 2017 2 commits
  18. 10 Nov, 2017 1 commit
  19. 08 Nov, 2017 1 commit
  20. 07 Nov, 2017 4 commits
  21. 03 Nov, 2017 3 commits
  22. 02 Nov, 2017 1 commit