1. 22 Sep, 2016 8 commits
    • Matt Caswell's avatar
      Fix a hang with SSL_peek() · 63658103
      Matt Caswell authored
      
      
      If while calling SSL_peek() we read an empty record then we go into an
      infinite loop, continually trying to read data from the empty record and
      never making any progress. This could be exploited by a malicious peer in
      a Denial Of Service attack.
      
      CVE-2016-6305
      
      GitHub Issue #1563
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      63658103
    • Matt Caswell's avatar
      Fix a mem leak in NPN handling · 6d32c2ae
      Matt Caswell authored
      
      
      If a server sent multiple NPN extensions in a single ClientHello then a
      mem leak can occur. This will only happen where the client has requested
      NPN in the first place. It does not occur during renegotiation. Therefore
      the maximum that could be leaked in a single connection with a malicious
      server is 64k (the maximum size of the ServerHello extensions section). As
      this is client side, only occurs if NPN has been requested and does not
      occur during renegotiation this is unlikely to be exploitable.
      
      Issue reported by Shi Lei.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      6d32c2ae
    • Matt Caswell's avatar
      Add some more OCSP testing · f6a7505e
      Matt Caswell authored
      
      
      Test that the OCSP callbacks work as expected.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      f6a7505e
    • Matt Caswell's avatar
      Add OCSP_RESPID_match() · 7409b0aa
      Matt Caswell authored
      
      
      Add a function for testing whether a given OCSP_RESPID matches with a
      certificate.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      7409b0aa
    • Matt Caswell's avatar
      Add the ability to set OCSP_RESPID fields · 1645f3f4
      Matt Caswell authored
      
      
      OCSP_RESPID was made opaque in 1.1.0, but no accessors were provided for
      setting the name/key value for the OCSP_RESPID.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      1645f3f4
    • Matt Caswell's avatar
      Fix OCSP Status Request extension unbounded memory growth · a59ab1c4
      Matt Caswell authored
      
      
      A malicious client can send an excessively large OCSP Status Request
      extension. If that client continually requests renegotiation,
      sending a large OCSP Status Request extension each time, then there will
      be unbounded memory growth on the server. This will eventually lead to a
      Denial Of Service attack through memory exhaustion. Servers with a
      default configuration are vulnerable even if they do not support OCSP.
      Builds using the "no-ocsp" build time option are not affected.
      
      I have also checked other extensions to see if they suffer from a similar
      problem but I could not find any other issues.
      
      CVE-2016-6304
      
      Issue reported by Shi Lei.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      a59ab1c4
    • Richard Levitte's avatar
      Fix error message typo, wrong function code · d8e94b0d
      Richard Levitte authored
      
      
      Reviewed-by: default avatarMatt Caswell <matt@openssl.org>
      (cherry picked from commit a449b47c)
      d8e94b0d
    • Richard Levitte's avatar
      test/x509aux.c: Fix argv loop · 2178c52a
      Richard Levitte authored
      
      
      There are cases when argc is more trustable than proper argv termination.
      Since we trust argc in all other test programs, we might as well treat it
      the same way in this program.
      
      Reviewed-by: default avatarMatt Caswell <matt@openssl.org>
      (cherry picked from commit 780bbb96)
      2178c52a
  2. 21 Sep, 2016 16 commits
  3. 20 Sep, 2016 11 commits
  4. 19 Sep, 2016 4 commits
  5. 17 Sep, 2016 1 commit