1. 22 Sep, 2016 2 commits
    • Matt Caswell's avatar
      Fix OCSP Status Request extension unbounded memory growth · ea39b16b
      Matt Caswell authored
      
      
      A malicious client can send an excessively large OCSP Status Request
      extension. If that client continually requests renegotiation,
      sending a large OCSP Status Request extension each time, then there will
      be unbounded memory growth on the server. This will eventually lead to a
      Denial Of Service attack through memory exhaustion. Servers with a
      default configuration are vulnerable even if they do not support OCSP.
      Builds using the "no-ocsp" build time option are not affected.
      
      I have also checked other extensions to see if they suffer from a similar
      problem but I could not find any other issues.
      
      CVE-2016-6304
      
      Issue reported by Shi Lei.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      ea39b16b
    • Richard Levitte's avatar
      90d6f351
  2. 21 Sep, 2016 9 commits
  3. 20 Sep, 2016 2 commits
  4. 15 Sep, 2016 11 commits
  5. 14 Sep, 2016 1 commit
    • Matt Caswell's avatar
      Add some sanity checks around usage of t_fromb64() · 68f11e82
      Matt Caswell authored
      
      
      The internal SRP function t_fromb64() converts from base64 to binary. It
      does not validate that the size of the destination is sufficiently large -
      that is up to the callers. In some places there was such a check, but not
      in others.
      
      Add an argument to t_fromb64() to provide the size of the destination
      buffer and validate that we don't write too much data. Also add some sanity
      checks to the callers where appropriate.
      
      With thanks to Shi Lei for reporting this issue.
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      (cherry picked from commit 73f0df83)
      68f11e82
  6. 13 Sep, 2016 1 commit
    • Matt Caswell's avatar
      Abort on unrecognised warning alerts · 15d81749
      Matt Caswell authored
      
      
      A peer continually sending unrecognised warning alerts could mean that we
      make no progress on a connection. We should abort rather than continuing if
      we receive an unrecognised warning alert.
      
      Thanks to Shi Lei for reporting this issue.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      15d81749
  7. 12 Sep, 2016 1 commit
  8. 11 Sep, 2016 1 commit
  9. 09 Sep, 2016 1 commit
  10. 08 Sep, 2016 1 commit
  11. 07 Sep, 2016 1 commit
  12. 06 Sep, 2016 1 commit
  13. 31 Aug, 2016 1 commit
  14. 30 Aug, 2016 1 commit
  15. 26 Aug, 2016 6 commits