1. 06 Jul, 2018 1 commit
  2. 04 Jul, 2018 1 commit
  3. 03 Jul, 2018 1 commit
  4. 02 Jul, 2018 2 commits
  5. 01 Jul, 2018 1 commit
  6. 29 Jun, 2018 1 commit
  7. 28 Jun, 2018 1 commit
  8. 25 Jun, 2018 2 commits
  9. 24 Jun, 2018 1 commit
  10. 23 Jun, 2018 2 commits
  11. 22 Jun, 2018 1 commit
  12. 21 Jun, 2018 7 commits
  13. 18 Jun, 2018 5 commits
  14. 15 Jun, 2018 1 commit
  15. 13 Jun, 2018 1 commit
    • Matt Caswell's avatar
      Add blinding to an ECDSA signature · 0c27d793
      Matt Caswell authored
      
      
      Keegan Ryan (NCC Group) has demonstrated a side channel attack on an
      ECDSA signature operation. During signing the signer calculates:
      
      s:= k^-1 * (m + r * priv_key) mod order
      
      The addition operation above provides a sufficient signal for a
      flush+reload attack to derive the private key given sufficient signature
      operations.
      
      As a mitigation (based on a suggestion from Keegan) we add blinding to
      the operation so that:
      
      s := k^-1 * blind^-1 (blind * m + blind * r * priv_key) mod order
      
      Since this attack is a localhost side channel only no CVE is assigned.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      0c27d793
  16. 12 Jun, 2018 2 commits
  17. 11 Jun, 2018 1 commit
  18. 09 Jun, 2018 1 commit
  19. 08 Jun, 2018 1 commit
  20. 07 Jun, 2018 1 commit
    • Marcus Huewe's avatar
      Do not free a session before calling the remove_session_cb · 6849421c
      Marcus Huewe authored
      If the remove_session_cb accesses the session's data (for instance,
      via SSL_SESSION_get_protocol_version), a potential use after free
      can occur. For this, consider the following scenario when adding
      a new session via SSL_CTX_add_session:
      
      - The session cache is full
        (SSL_CTX_sess_number(ctx) > SSL_CTX_sess_get_cache_size(ctx))
      - Only the session cache has a reference to ctx->session_cache_tail
        (that is, ctx->session_cache_tail->references == 1)
      
      Since the cache is full, remove_session_lock is called to remove
      ctx->session_cache_tail from the cache. That is, it
      SSL_SESSION_free()s the session, which free()s the data. Afterwards,
      the free()d session is passed to the remove_session_cb. If the callback
      accesses the session's data, we have a use after free.
      
      The free before calling the callback behavior was introduced in
      commit e4612d02
      
       ("Remove sessions
      from external cache, even if internal cache not used.").
      
      CLA: trivial
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      Reviewed-by: default avatarMatt Caswell <matt@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/6222)
      
      (cherry picked from commit c0a58e03)
      6849421c
  21. 05 Jun, 2018 2 commits
  22. 02 Jun, 2018 1 commit
  23. 31 May, 2018 2 commits
  24. 30 May, 2018 1 commit