Skip to content
  1. Jun 29, 2016
  2. Jun 27, 2016
  3. Jun 26, 2016
  4. Jun 25, 2016
  5. Jun 24, 2016
  6. Jun 23, 2016
  7. Jun 22, 2016
  8. Jun 21, 2016
  9. Jun 20, 2016
  10. Jun 16, 2016
  11. Jun 15, 2016
  12. Jun 14, 2016
  13. Jun 13, 2016
  14. Jun 12, 2016
  15. Jun 10, 2016
  16. Jun 07, 2016
  17. Jun 06, 2016
    • Cesar Pereida's avatar
      Fix DSA, preserve BN_FLG_CONSTTIME · 621eaf49
      Cesar Pereida authored
      
      
      Operations in the DSA signing algorithm should run in constant time in
      order to avoid side channel attacks. A flaw in the OpenSSL DSA
      implementation means that a non-constant time codepath is followed for
      certain operations. This has been demonstrated through a cache-timing
      attack to be sufficient for an attacker to recover the private DSA key.
      
      CVE-2016-2178
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      Reviewed-by: default avatarMatt Caswell <matt@openssl.org>
      621eaf49