1. 02 Aug, 2016 3 commits
  2. 22 Jul, 2016 1 commit
    • Dr. Stephen Henson's avatar
      Fix OOB read in TS_OBJ_print_bio(). · 6adf409c
      Dr. Stephen Henson authored
      
      
      TS_OBJ_print_bio() misuses OBJ_txt2obj: it should print the result
      as a null terminated buffer. The length value returned is the total
      length the complete text reprsentation would need not the amount of
      data written.
      
      CVE-2016-2180
      
      Thanks to Shi Lei for reporting this bug.
      
      Reviewed-by: default avatarMatt Caswell <matt@openssl.org>
      (cherry picked from commit 0ed26acc)
      6adf409c
  3. 30 Jun, 2016 1 commit
  4. 29 Jun, 2016 3 commits
  5. 27 Jun, 2016 1 commit
  6. 07 Jun, 2016 1 commit
  7. 06 Jun, 2016 1 commit
    • Cesar Pereida's avatar
      Fix DSA, preserve BN_FLG_CONSTTIME · d168705e
      Cesar Pereida authored
      
      
      Operations in the DSA signing algorithm should run in constant time in
      order to avoid side channel attacks. A flaw in the OpenSSL DSA
      implementation means that a non-constant time codepath is followed for
      certain operations. This has been demonstrated through a cache-timing
      attack to be sufficient for an attacker to recover the private DSA key.
      
      CVE-2016-2178
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      Reviewed-by: default avatarMatt Caswell <matt@openssl.org>
      (cherry picked from commit 621eaf49)
      d168705e
  8. 03 Jun, 2016 1 commit
  9. 01 Jun, 2016 1 commit
    • Matt Caswell's avatar
      Avoid some undefined pointer arithmetic · 6f35f6de
      Matt Caswell authored
      
      
      A common idiom in the codebase is:
      
      if (p + len > limit)
      {
          return; /* Too long */
      }
      
      Where "p" points to some malloc'd data of SIZE bytes and
      limit == p + SIZE
      
      "len" here could be from some externally supplied data (e.g. from a TLS
      message).
      
      The rules of C pointer arithmetic are such that "p + len" is only well
      defined where len <= SIZE. Therefore the above idiom is actually
      undefined behaviour.
      
      For example this could cause problems if some malloc implementation
      provides an address for "p" such that "p + len" actually overflows for
      values of len that are too big and therefore p + len < limit!
      
      Issue reported by Guido Vranken.
      
      CVE-2016-2177
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      6f35f6de
  10. 26 May, 2016 2 commits
  11. 23 May, 2016 1 commit
  12. 19 May, 2016 1 commit
  13. 11 May, 2016 2 commits
  14. 09 May, 2016 1 commit
  15. 06 May, 2016 3 commits
  16. 05 May, 2016 2 commits
  17. 04 May, 2016 3 commits
  18. 03 May, 2016 12 commits