Skip to content
  1. Sep 01, 2015
    • Emilia Kasper's avatar
      RT 3493: fix RSA test · 5f623eb6
      Emilia Kasper authored
      
      
      - Pass in the right ciphertext length to ensure we're indeed testing
        ciphertext corruption (and not truncation).
      - Only test one mutation per byte to not make the test too slow.
      - Add a separate test for truncated ciphertexts.
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      (cherry picked from commit 25d6b340)
      5f623eb6
  2. Aug 31, 2015
  3. Aug 30, 2015
  4. Aug 28, 2015
  5. Aug 26, 2015
  6. Aug 25, 2015
  7. Aug 17, 2015
  8. Aug 16, 2015
  9. Aug 14, 2015
  10. Aug 13, 2015
  11. Aug 12, 2015
  12. Aug 11, 2015
    • Matt Caswell's avatar
      Fix "make test" seg fault with SCTP enabled · 0b12fa75
      Matt Caswell authored
      
      
      When config'd with "sctp" running "make test" causes a seg fault. This is
      actually due to the way ssltest works - it dives under the covers and frees
      up BIOs manually and so some BIOs are NULL when the SCTP code does not
      expect it. The simplest fix is just to add some sanity checks to make sure
      the BIOs aren't NULL before we use them.
      
      This problem occurs in master and 1.0.2. The fix has also been applied to
      1.0.1 to keep the code in sync.
      
      Reviewed-by: default avatarTim Hudson <tjh@openssl.org>
      (cherry picked from commit f75d5171)
      0b12fa75
    • Matt Caswell's avatar
      Fix missing return value checks in SCTP · b3a62dc0
      Matt Caswell authored
      
      
      There are some missing return value checks in the SCTP code. In master this
      was causing a compilation failure when config'd with
      "--strict-warnings sctp".
      
      Reviewed-by: default avatarTim Hudson <tjh@openssl.org>
      (cherry picked from commit d8e8590e)
      b3a62dc0
    • Matt Caswell's avatar
      Check for 0 modulus in BN_MONT_CTX_set · 512368c9
      Matt Caswell authored
      
      
      The function BN_MONT_CTX_set was assuming that the modulus was non-zero
      and therefore that |mod->top| > 0. In an error situation that may not be
      the case and could cause a seg fault.
      
      This is a follow on from CVE-2015-1794.
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      512368c9
    • Guy Leaver (guleaver)'s avatar
      Fix seg fault with 0 p val in SKE · ada57746
      Guy Leaver (guleaver) authored
      
      
      If a client receives a ServerKeyExchange for an anon DH ciphersuite with the
      value of p set to 0 then a seg fault can occur. This commits adds a test to
      reject p, g and pub key parameters that have a 0 value (in accordance with
      RFC 5246)
      
      The security vulnerability only affects master and 1.0.2, but the fix is
      additionally applied to 1.0.1 for additional confidence.
      
      CVE-2015-1794
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      Reviewed-by: default avatarMatt Caswell <matt@openssl.org>
      ada57746
  13. Aug 08, 2015
  14. Aug 06, 2015
  15. Aug 04, 2015
  16. Aug 01, 2015
  17. Jul 31, 2015