commit_msg
stringlengths
1
24.2k
commit_hash
stringlengths
2
84
project
stringlengths
2
40
source
stringclasses
4 values
labels
int64
0
1
repo_url
stringlengths
26
70
commit_url
stringlengths
74
118
commit_date
stringlengths
25
25
Fix some bugs with the cfb1 bitsize handling Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/5426)
604e591ed75eff9296c21ee5fe93f3e9ec246094
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/604e591ed75eff9296c21ee5fe93f3e9ec246094
2018-02-21 15:48:02+01:00
Fix access zero memory if SSL_DEBUG is enabled If compile OpenSSL with SSL_DEBUG macro, some test cases will cause the process crashed in the debug code. Reviewed-by: Tim Hudson <[email protected]> Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/7707)
5a4481f0e0bbf836c7f41805e84617784cb6b1db
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/5a4481f0e0bbf836c7f41805e84617784cb6b1db
2018-11-26 16:57:55+08:00
ssl sigalg extension: fix NULL pointer dereference As the variable peer_sigalgslen is not cleared on ssl rehandshake, it's possible to crash an openssl tls secured server remotely by sending a manipulated hello message in a rehandshake. On such a manipulated rehandshake, tls1_set_shared_sigalgs() calls tls12_shared_sigalgs() with the peer_sigalgslen of the previous handshake, while the peer_sigalgs has been freed. As a result tls12_shared_sigalgs() walks over the available peer_sigalgs and tries to access data of a NULL pointer. This issue was introduced by c589c34e61 (Add support for the TLS 1.3 signature_algorithms_cert extension, 2018-01-11). Signed-off-by: Peter Kästle <[email protected]> Signed-off-by: Samuel Sapalski <[email protected]> CVE-2021-3449 CLA: trivial Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Matt Caswell <[email protected]>
02b1636fe3db274497304a3e95a4e32ced7e841b
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/02b1636fe3db274497304a3e95a4e32ced7e841b
2021-03-15 13:19:56+01:00
Spelling Reviewed-by: Andy Polyakov <[email protected]> Reviewed-by: Kurt Roeckx <[email protected]> Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/1264)
9d22666eb89af7f4ca5c3d52490b7da89276cf90
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/9d22666eb89af7f4ca5c3d52490b7da89276cf90
2016-06-28 22:39:55+02:00
Add a test for correct handling of the cryptopro bug extension This was complicated by the fact that we were using this extension for our duplicate extension handling tests. In order to add tests for cryptopro bug the duplicate extension handling tests needed to change first. Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/7984)
9effc496ad8a9b0ec737c69cc0fddf610a045ea4
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/9effc496ad8a9b0ec737c69cc0fddf610a045ea4
2019-01-04 16:55:15+00:00
Fix bug in entropy gathering. This only impacts FIPS mode or someone who has enabled the FIPS 140.2 4.9.2 Conditional Tests. i.e. nobody currently. Fix a significant issue in the entropy gathering for the continuous RNG testing. The impact is using an uninitialised buffer instead of the gathered entropy. Reviewed-by: Kurt Roeckx <[email protected]> (Merged from https://github.com/openssl/openssl/pull/8789)
b8621bdde70690361a36dca52688a3d946c3fe0f
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/b8621bdde70690361a36dca52688a3d946c3fe0f
2019-04-19 16:23:23+10:00
Fix a memleak on an error path in the pkcs12 test helpers Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/15269)
a113826eac59a1e897c679beaa5934542c46952d
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/a113826eac59a1e897c679beaa5934542c46952d
2021-05-13 15:13:22+01:00
drbg: ensure fork-safety without using a pthread_atfork handler When the new OpenSSL CSPRNG was introduced in version 1.1.1, it was announced in the release notes that it would be fork-safe, which the old CSPRNG hadn't been. The fork-safety was implemented using a fork count, which was incremented by a pthread_atfork handler. Initially, this handler was enabled by default. Unfortunately, the default behaviour had to be changed for other reasons in commit b5319bdbd095, so the new OpenSSL CSPRNG failed to keep its promise. This commit restores the fork-safety using a different approach. It replaces the fork count by a fork id, which coincides with the process id on UNIX-like operating systems and is zero on other operating systems. It is used to detect when an automatic reseed after a fork is necessary. To prevent a future regression, it also adds a test to verify that the child reseeds after fork. CVE-2019-1549 Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/9832)
849529257c9979c7ca0d28e8b80a47bc4a36d4f2
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/849529257c9979c7ca0d28e8b80a47bc4a36d4f2
2019-05-27 21:03:09+02:00
Fix an error code spelling. Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/952)
8fdc99cb5dbf1a79b106cc635c82f59956e39108
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/8fdc99cb5dbf1a79b106cc635c82f59956e39108
2016-04-04 20:42:27+02:00
various spelling fixes Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/952)
8483a003bfca5fac61cda3daea4db2ca20d10ef2
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/8483a003bfca5fac61cda3daea4db2ca20d10ef2
2016-03-10 21:34:48+01:00
Fix a bug in create_ssl_ctx_pair() The max protocol version was only being set on the server side. It should have been done on both the client and the server. Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/6113)
6021d8ec5affe07116cdae81fa3db81d67996aac
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/6021d8ec5affe07116cdae81fa3db81d67996aac
2018-04-27 12:09:08+01:00
Avoid overflow in EVP_EncodeUpdate An overflow can occur in the EVP_EncodeUpdate function which is used for Base64 encoding of binary data. If an attacker is able to supply very large amounts of input data then a length check can overflow resulting in a heap corruption. Due to the very large amounts of data involved this will most likely result in a crash. Internally to OpenSSL the EVP_EncodeUpdate function is primarly used by the PEM_write_bio* family of functions. These are mainly used within the OpenSSL command line applications, so any application which processes data from an untrusted source and outputs it as a PEM file should be considered vulnerable to this issue. User applications that call these APIs directly with large amounts of untrusted data may also be vulnerable. Issue reported by Guido Vranken. CVE-2016-2105 Reviewed-by: Richard Levitte <[email protected]>
ee1e3cac2e83abc77bcc8ff98729ca1e10fcc920
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/ee1e3cac2e83abc77bcc8ff98729ca1e10fcc920
2016-03-04 10:17:17+00:00
FIX strncpy warning in apps/cmp.c. bugfix: #12872 strncpy here has compiling warning of -Wstringop-truncation, change into BIO_snprintf as before. Change-Id: I362872c4ad328cadd4c7a5a5da3165655fa26c0d Reviewed-by: Paul Dale <[email protected]> Reviewed-by: David von Oheimb <[email protected]> (Merged from https://github.com/openssl/openssl/pull/12889)
ebcae87f6b62ed9b79a1255dbb3c69c635cea4d8
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/ebcae87f6b62ed9b79a1255dbb3c69c635cea4d8
2020-09-15 01:59:02+00:00
Fix bug in TLSv1.3 PSK processing The recent SSL error overhaul left a case where an error occurs but SSLfatal() is not called. Credit to OSSfuzz for finding this issue. Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/4847)
2894e9cb6de62baec5b17d4f248b4ff12eb62005
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/2894e9cb6de62baec5b17d4f248b4ff12eb62005
2017-12-05 13:36:13+00:00
Make BN_GF2m_mod_arr more constant time Experiments have shown that the lookup table used by BN_GF2m_mod_arr introduces sufficient timing signal to recover the private key for an attacker with access to cache timing information on the victim's host. This only affects binary curves (which are less frequently used). No CVE is considered necessary for this issue. The fix is to replace the lookup table with an on-the-fly calculation of the value from the table instead, which can be performed in constant time. Thanks to Youngjoo Shin for reporting this issue. Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/6270)
b336ce57f2d5cca803a920d2a9e622b588cead3c
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/b336ce57f2d5cca803a920d2a9e622b588cead3c
2018-05-16 09:58:27+01:00
crypto: Fix various typos, repeated words, align some spelling to LDP. partially revamped from #16712 - fall thru -> fall through - time stamp -> timestamp - file name -> filename - host name -> hostname Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/19059)
1567a821a4616f59748fa8982724f88e542867d6
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/1567a821a4616f59748fa8982724f88e542867d6
2022-08-23 20:33:58+02:00
Don't overflow the output length in EVP_CipherUpdate calls CVE-2021-23840 Reviewed-by: Paul Dale <[email protected]>
c9fb704cf3af5524eb8e79961e31b60eee8c3c47
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/c9fb704cf3af5524eb8e79961e31b60eee8c3c47
2021-02-02 17:17:23+00:00
Fix a read buffer overrun in X509_aux_print(). The ASN1_STRING_get0_data(3) manual explitely cautions the reader that the data is not necessarily NUL-terminated, and the function X509_alias_set1(3) does not sanitize the data passed into it in any way either, so we must assume the return value from X509_alias_get0(3) is merely a byte array and not necessarily a string in the sense of the C language. I found this bug while writing manual pages for X509_print_ex(3) and related functions. Theo Buehler <[email protected]> checked my patch to fix the same bug in LibreSSL, see http://cvsweb.openbsd.org/src/lib/libcrypto/asn1/t_x509a.c#rev1.9 As an aside, note that the function still produces incomplete and misleading results when the data contains a NUL byte in the middle and that error handling is consistently absent throughout, even though the function provides an "int" return value obviously intended to be 1 for success and 0 for failure, and even though this function is called by another function that also wants to return 1 for success and 0 for failure and even does so in many of its code paths, though not in others. But let's stay focussed. Many things would be nice to have in the wide wild world, but a buffer overflow must not be allowed to remain in our backyard. CLA: trivial Reviewed-by: Tim Hudson <[email protected]> Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/16108)
c5dc9ab965f2a69bca964c709e648158f3e4cd67
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/c5dc9ab965f2a69bca964c709e648158f3e4cd67
2021-07-18 17:48:06+02:00
Fix two spelling errors CLA: trivial Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Matthias St. Pierre <[email protected]> (Merged from https://github.com/openssl/openssl/pull/8447)
3dcbb6c4a395d56dfa561145d89017ff958bb18e
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/3dcbb6c4a395d56dfa561145d89017ff958bb18e
2019-03-09 19:05:31+01:00
ECDSA: remove nonce padding (delegated to EC_POINT_mul) * EC_POINT_mul is now responsible for constant time point multiplication (for single fixed or variable point multiplication, when the scalar is in the range [0,group_order), so we need to strip the nonce padding from ECDSA. * Entry added to CHANGES * Updated EC_POINT_mul documentation - Integrate existing EC_POINT_mul and EC_POINTs_mul entries in the manpage to reflect the shift in constant-time expectations when performing a single fixed or variable point multiplication; - Add documentation to ec_method_st to reflect the updated "contract" between callers and implementations of ec_method_st.mul. Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Andy Polyakov <[email protected]> Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/6070)
fe2d3975880e6a89702f18ec58881307bf862542
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/fe2d3975880e6a89702f18ec58881307bf862542
2018-04-24 16:00:08+03:00
openssl.pod: Add documentation for using the loader_attic engine Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/13551)
acfccbd5ee09e453ac5e8f39744540907b0cac2b
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/acfccbd5ee09e453ac5e8f39744540907b0cac2b
2020-11-27 14:09:22+01:00
Fix a bug in ecp_nistp224.c. felem_neg does not produce an output within the tight bounds suitable for felem_contract. This affects build configurations which set enable-ec_nistp_64_gcc_128. point_double and point_add, in the non-z*_is_zero cases, tolerate and fix up the wider bounds, so this only affects point_add calls where the other point is infinity. Thus it only affects the final addition in arbitrary-point multiplication, giving the wrong y-coordinate. This is a no-op for ECDH and ECDSA, which only use the x-coordinate of arbitrary-point operations. Note: ecp_nistp521.c has the same issue in that the documented preconditions are violated by the test case. I have not addressed this in this PR. ecp_nistp521.c does not immediately produce the wrong answer; felem_contract there appears to be a bit more tolerant than its documented preconditions. However, I haven't checked the point_add property above holds. ecp_nistp521.c should either get this same fix, to be conservative, or have the bounds analysis and comments reworked for the wider bounds. Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/5779)
dc55e4f70f401c5869410d6a0c068c18c3fd53ec
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/dc55e4f70f401c5869410d6a0c068c18c3fd53ec
2018-03-28 12:21:45-04:00
add documentation Reviewed-by: Bernd Edlinger <[email protected]> Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/7848)
9058d9bcd0a0391353720f7728a48596b575ad64
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/9058d9bcd0a0391353720f7728a48596b575ad64
2018-12-06 21:36:08+02:00
x509_att.c: improve error checking and reporting and coding style Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: David von Oheimb <[email protected]> (Merged from https://github.com/openssl/openssl/pull/18931)
ba9e3721febb073397248154a846f2088efd6409
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/ba9e3721febb073397248154a846f2088efd6409
2022-08-01 16:33:35+02:00
Fix BN_hex2bn/BN_dec2bn NULL ptr/heap corruption In the BN_hex2bn function the number of hex digits is calculated using an int value |i|. Later |bn_expand| is called with a value of |i * 4|. For large values of |i| this can result in |bn_expand| not allocating any memory because |i * 4| is negative. This leaves ret->d as NULL leading to a subsequent NULL ptr deref. For very large values of |i|, the calculation |i * 4| could be a positive value smaller than |i|. In this case memory is allocated to ret->d, but it is insufficiently sized leading to heap corruption. A similar issue exists in BN_dec2bn. This could have security consequences if BN_hex2bn/BN_dec2bn is ever called by user applications with very large untrusted hex/dec data. This is anticipated to be a rare occurrence. All OpenSSL internal usage of this function uses data that is not expected to be untrusted, e.g. config file data or application command line arguments. If user developed applications generate config file data based on untrusted data then it is possible that this could also lead to security consequences. This is also anticipated to be a rare. Issue reported by Guido Vranken. CVE-2016-0797 Reviewed-by: Andy Polyakov <[email protected]>
99ba9fd02fd481eb971023a3a0a251a37eb87e4c
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/99ba9fd02fd481eb971023a3a0a251a37eb87e4c
2016-02-22 10:27:18+00:00
apps & al : Fix various typos, repeated words, align some spelling to LDP. Mostly revamped from #16712 - fall thru -> fall through - time stamp -> timestamp - host name -> hostname - ipv6 -> IPv6 Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/19059)
9929c81702381bff54f833d6fe0a3304f4e2b635
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/9929c81702381bff54f833d6fe0a3304f4e2b635
2022-08-23 20:45:13+02:00
s390x assembly pack: fix formal interface bug in chacha module Signed-off-by: Patrick Steuer <[email protected]> Reviewed-by: Tim Hudson <[email protected]> Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/8257)
b2b580fe445e064da50c13d3e00f71022da16ece
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/b2b580fe445e064da50c13d3e00f71022da16ece
2019-02-15 22:59:09+01:00
PBKDF2 implementation: refactor to avoid memleak Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/9662)
b1f15129933fdc98134ef2fcafb1ecea710f5920
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/b1f15129933fdc98134ef2fcafb1ecea710f5920
2019-08-30 15:11:08+02:00
bugfix in ossl_cmp_msg_protect(): set senderKID and extend extraCerts also for unprotected CMP requests Reviewed-by: Tim Hudson <[email protected]> (Merged from https://github.com/openssl/openssl/pull/12822)
543a802fabc6e53cd7b50b5561b9b0abbf769667
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/543a802fabc6e53cd7b50b5561b9b0abbf769667
2020-09-04 17:09:13+02:00
GH753: More spelling fix Signed-off-by: Rich Salz <[email protected]> Reviewed-by: Kurt Roeckx <[email protected]>
b6453a68bbb34c901a2eaf24012d0a3afcbf52ff
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/b6453a68bbb34c901a2eaf24012d0a3afcbf52ff
2016-02-26 20:30:15+01:00
chacha20/poly1305: make sure to clear the buffer at correct position The offset to the memory to clear was incorrect, causing a heap buffer overflow. CVE-2016-7054 Thanks to Robert Święcki for reporting this Reviewed-by: Rich Salz <[email protected]>
bf52165bda53524a267c784696bd074111a2f178
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/bf52165bda53524a267c784696bd074111a2f178
2016-11-04 14:21:46+01:00
Workaround an IO::Socket::IP bug Workaround an apparent IO:Socket::IP bug where a seemingly valid server socket is being returned even though a valid connection does not exist. This causes the tests to intermittently hang. We additionally check that the peerport looks ok to verify that the returned socket looks usable. Reviewed-by: Richard Levitte <[email protected]>
6ae545248109710365189047ba945700ab8afff3
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/6ae545248109710365189047ba945700ab8afff3
2016-05-16 16:54:28+01:00
Fix CVE-2022-3602 in punycode decoder. An off by one error in the punycode decoder allowed for a single unsigned int overwrite of a buffer which could cause a crash and possible code execution. Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (cherry picked from commit fe3b639dc19b325846f4f6801f2f4604f56e3de3)
3b421ebc64c7b52f1b9feb3812bdc7781c784332
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/3b421ebc64c7b52f1b9feb3812bdc7781c784332
2022-10-27 10:21:41+11:00
Fix an overflow bug in rsaz_512_sqr There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. CVE-2019-1551 Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Bernd Edlinger <[email protected]> (Merged from https://github.com/openssl/openssl/pull/10574)
8c6f86c7c5350fadf22d32d6cd4712e2ad4447ba
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/8c6f86c7c5350fadf22d32d6cd4712e2ad4447ba
2019-12-04 12:48:21+01:00
util/find-doc-nits: improve error diagnostics on missing man section numbers in links Reviewed-by: Hugo Landau <[email protected]> Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: David von Oheimb <[email protected]> (Merged from https://github.com/openssl/openssl/pull/20369)
9a2f78e14a67eeaadefc77d05f0778fc9684d26c
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/9a2f78e14a67eeaadefc77d05f0778fc9684d26c
2023-02-24 14:04:10+01:00
Reject invalid PSS parameters. Fix a bug where invalid PSS parameters are not rejected resulting in a NULL pointer exception. This can be triggered during certificate verification so could be a DoS attack against a client or a server enabling client authentication. Thanks to Brian Carpenter for reporting this issues. CVE-2015-0208 Reviewed-by: Tim Hudson <[email protected]>
09f06923e636019c39c807cb59c481375e720556
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/09f06923e636019c39c807cb59c481375e720556
2015-03-09 23:16:33+00:00
pariscid.pl: fix nasty typo in CRYPTO_memcmp. Comparison was effectively reduced to least significant bits. CVE-2018-0733 Reviewed-by: Matt Caswell <[email protected]>
0b020b14882173918b9cc3e8e3bd85fb9ffac948
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/0b020b14882173918b9cc3e8e3bd85fb9ffac948
2018-03-21 23:48:10+01:00
Fix a bug for aarch64 BigEndian FIXES #10692 #10638 a bug for aarch64 bigendian with instructions 'st1' and 'ld1' on AES-GCM mode. CLA: trivial Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Tim Hudson <[email protected]> Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/10751)
bc8b648f744566031ce84d77333dbbcb9689e975
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/bc8b648f744566031ce84d77333dbbcb9689e975
2020-01-03 22:56:18+08:00
Fix encoding bug in i2c_ASN1_INTEGER Fix bug where i2c_ASN1_INTEGER mishandles zero if it is marked as negative. Thanks to Huzaifa Sidhpurwala <[email protected]> and Hanno Böck <[email protected]> for reporting this issue. Reviewed-by: Rich Salz <[email protected]>
a0eed48d37a4b7beea0c966caf09ad46f4a92a44
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/a0eed48d37a4b7beea0c966caf09ad46f4a92a44
2015-04-16 16:43:09+01:00
Add documentation for SSL_key_update() and SSL_get_key_update_type() This also adds documentation for the pre-existing and related SSL_renegotiate*() functions. Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/2609)
398206375688f053774ab0622a59db69fb2e2b99
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/398206375688f053774ab0622a59db69fb2e2b99
2017-02-14 15:25:22+00:00
Add documentation for the SSL_export_keying_material() function Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3735)
23cec1f4b4801c643853bf2eb07d7eae5f4fe7cb
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/23cec1f4b4801c643853bf2eb07d7eae5f4fe7cb
2017-06-21 13:55:02+01:00
Fix various typos, repeated words, align some spelling to LDP. Partially revamped from #16712 - fall thru -> fall through - time stamp -> timestamp - host name -> hostname - ipv6 -> IPv6 Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/19059)
d7f3a2cc8691c062ef5bdeef28b66f80c8f7d5c3
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/d7f3a2cc8691c062ef5bdeef28b66f80c8f7d5c3
2022-08-23 20:40:44+02:00
Fix spelling errors in CMS. Unfortunately it affects error code macros in public cms.h header, for which reason misspelled names are preserved for backward compatibility. Reviewed-by: Andy Polyakov <[email protected]> Reviewed-by: Kurt Roeckx <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3463)
df578aa01314acd072038b703ac3ec002208da03
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/df578aa01314acd072038b703ac3ec002208da03
2017-05-19 00:16:30+00:00
Use --debug with no-caching build as sanitizers need it The memleak test otherwise fails. Also disable async, dtls, and old tls versions to test some different combination of disableables and speed up tests. Fixes #14337 Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/14536)
bd55a0be1b5696f643863718e7aa916feccafdf4
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/bd55a0be1b5696f643863718e7aa916feccafdf4
2021-03-12 15:23:03+01:00
Fix a hang with SSL_peek() If while calling SSL_peek() we read an empty record then we go into an infinite loop, continually trying to read data from the empty record and never making any progress. This could be exploited by a malicious peer in a Denial Of Service attack. CVE-2016-6305 GitHub Issue #1563 Reviewed-by: Rich Salz <[email protected]>
b8d243956296458d1782af0d6e7ecfe6deae038a
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/b8d243956296458d1782af0d6e7ecfe6deae038a
2016-09-10 21:24:40+01:00
various spelling fixes Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Rich Salz <[email protected]>
620d540bd47a96fb6905fbbdd8ea5167a8841a3e
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/620d540bd47a96fb6905fbbdd8ea5167a8841a3e
2016-03-10 21:34:48+01:00
Updated CHANGES.md and NEWS.md for CVE-2023-0465 Also updated the entries for CVE-2023-0464 Related-to: CVE-2023-0465 Reviewed-by: Hugo Landau <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/20585)
986f9a674d49d1e13459e04bd721237c721c44f4
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/986f9a674d49d1e13459e04bd721237c721c44f4
2023-03-23 15:31:25+00:00
X509V3_set_ctx(): Improve documentation Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/17358)
b6144bb8c1be63935ae09e1992c04fbe6e0f88a8
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/b6144bb8c1be63935ae09e1992c04fbe6e0f88a8
2021-12-27 19:14:03+01:00
Bugfix: unsafe return check of EVP_PKEY_fromdata Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/16783)
d11cab47810715ba472070300b180944a1d93633
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/d11cab47810715ba472070300b180944a1d93633
2021-10-08 17:01:47+08:00
Fix misspelling errors and typos reported by codespell Fixes #10998 Reviewed-by: Shane Lontis <[email protected]> (Merged from https://github.com/openssl/openssl/pull/11000)
7fa8bcfe4342df41919f5564b315f9c85d0a02d6
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/7fa8bcfe4342df41919f5564b315f9c85d0a02d6
2020-02-02 22:54:01+01:00
Temporarily disable the explicit enable-asan build The explicit enable-asan build fails in the memleak test for unknown reasons. Therefore we disable it temporarily to get a green Travis. Other builds that use -fsanitize=address in Travis seem to pass. [extended tests] Reviewed-by: Nicola Tuveri <[email protected]> Reviewed-by: Matthias St. Pierre <[email protected]> (Merged from https://github.com/openssl/openssl/pull/10689)
5f95fbf39987848fc50fc8acf42eb8f4a7ec8666
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/5f95fbf39987848fc50fc8acf42eb8f4a7ec8666
2019-12-23 17:14:58+00:00
Configure: fix small spelling error Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/5533)
ed504a20843fce750ac8d1b55d5bb142421ad3df
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/ed504a20843fce750ac8d1b55d5bb142421ad3df
2018-03-06 21:03:21+01:00
apps/speed: allow to continue tests after any init failure handling. previouly the exit(1) call was aborting the whole execution. Improve error message. Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/10078)
af0857f0e7ae46b7c3df2eca496cfcb71f1ff904
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/af0857f0e7ae46b7c3df2eca496cfcb71f1ff904
2019-10-19 16:38:21+02:00
Add documentation about Capabilities Document the OSSL_PROVIDER_get_capabilities() function as well as the provider side support for capabilities. Reviewed-by: Shane Lontis <[email protected]> (Merged from https://github.com/openssl/openssl/pull/11914)
3c49e4ff519abee92d9557eca8653ab82cd5787c
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/3c49e4ff519abee92d9557eca8653ab82cd5787c
2020-05-21 15:57:35+01:00
Avoid possible memleak in X509_policy_check() When tree_calculate_user_set() fails, a jump to error failed to deallocate a possibly allocated |auth_nodes|. Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3850)
67f060acefae34d820ccdb2f560d86ed10633500
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/67f060acefae34d820ccdb2f560d86ed10633500
2017-07-05 11:03:34+02:00
Fix OCSP_basic_verify signer certificate validation The function `OCSP_basic_verify` validates the signer certificate on an OCSP response. The internal function, ocsp_verify_signer, is responsible for this and is expected to return a 0 value in the event of a failure to verify. Unfortunately, due to a bug, it actually returns with a postive success response in this case. In the normal course of events OCSP_basic_verify will then continue and will fail anyway in the ocsp_check_issuer function because the supplied "chain" value will be empty in the case that ocsp_verify_signer failed to verify the chain. This will cause OCSP_basic_verify to return with a negative result (fatal error). Normally in the event of a failure to verify it should return with 0. However, in the case of the OCSP_NOCHECKS flag being used, OCSP_basic_verify will return with a positvie result. This could lead to callers trusting an OCSP Basic response when it should not be. CVE-2022-1343 Fixes #18053 Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Matt Caswell <[email protected]>
21f89f542d745adbf1131338929ae538e200d50d
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/21f89f542d745adbf1131338929ae538e200d50d
2022-04-13 16:36:54+01:00
Fix memleak in PKCS12_pbe_crypt_ex() Makes sure that the variable 'out' is free on every error path. Fixes #18689 Reviewed-by: Dmitry Belyavskiy <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/18808)
af801ec89205aaf6ebf8522d510d0b1fc29e3233
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/af801ec89205aaf6ebf8522d510d0b1fc29e3233
2022-07-15 11:21:30+02:00
Fix a WPACKET bug If we request more bytes to be allocated than double what we have already written, then we grow the buffer by the wrong amount. Reviewed-by: Emilia Käsper <[email protected]>
f789b04f407c2003da62d2b91b587629f1a781d0
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/f789b04f407c2003da62d2b91b587629f1a781d0
2016-09-23 16:41:50+01:00
apps/cmp.c: Improve documentation of -secret, -cert, and -key options Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/12825)
ef2d3588e8d4dea8910ab1f7dfec768403efb265
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/ef2d3588e8d4dea8910ab1f7dfec768403efb265
2020-08-28 13:28:24+02:00
Generate some certificates with the certificatePolicies extension Related-to: CVE-2023-0465 Reviewed-by: Hugo Landau <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/20585)
a4e726428608e352283d745cb0716248d29ecf26
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/a4e726428608e352283d745cb0716248d29ecf26
2023-03-07 15:22:40+00:00
bn/asm/x86_64-mont5.pl: fix carry bug in bn_sqr8x_internal. CVE-2017-3732 Reviewed-by: Rich Salz <[email protected]>
3f4bcf5bb664b47ed369a70b99fac4e0ad141bb3
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/3f4bcf5bb664b47ed369a70b99fac4e0ad141bb3
2017-01-21 21:30:49+01:00
Fix NULL dereference in SSL_check_chain() for TLS 1.3 In the tls1_check_sig_alg() helper function, we loop through the list of "signature_algorithms_cert" values received from the client and attempt to look up each one in turn in our internal table that maps wire codepoint to string-form name, digest and/or signature NID, etc., in order to compare the signature scheme from the peer's list against what is used to sign the certificates in the certificate chain we're checking. Unfortunately, when the peer sends a value that we don't support, the lookup returns NULL, but we unconditionally dereference the lookup result for the comparison, leading to an application crash triggerable by an unauthenticated client. Since we will not be able to say anything about algorithms we don't recognize, treat NULL return from lookup as "does not match". We currently only apply the "signature_algorithm_cert" checks on TLS 1.3 connections, so previous TLS versions are unaffected. SSL_check_chain() is not called directly from libssl, but may be used by the application inside a callback (e.g., client_hello or cert callback) to verify that a candidate certificate chain will be acceptable to the client. CVE-2020-1967 Reviewed-by: Matt Caswell <[email protected]>
a87f3fe01a5a894aa27ccd6a239155fd129988e4
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/a87f3fe01a5a894aa27ccd6a239155fd129988e4
2020-04-10 12:27:28-07:00
Fix infinite verification loops due to has_san_id Where name constraints apply, X509_verify() would incorrectly report an internal error in the event that a certificate has no SAN extension. CVE-2021-4044 Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Matt Caswell <[email protected]>
6894e20b50c1204bfc990093b4e7ccd10f92865d
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/6894e20b50c1204bfc990093b4e7ccd10f92865d
2021-11-29 03:41:20+00:00
Fix memleaks in async api Fixes: #5950 Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/6038)
74a8acbdfb2c7f398d1ae2fe914cd32b437f6df4
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/74a8acbdfb2c7f398d1ae2fe914cd32b437f6df4
2018-04-26 18:39:51+02:00
Add documentation for the new custom extensions API Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3139)
314aec07ef25844c498794f49dfb1fdf6b467323
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/314aec07ef25844c498794f49dfb1fdf6b467323
2017-04-06 17:33:23+01:00
Fix doc-nits for list command Bug was introduced in #13669 Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: Nicola Tuveri <[email protected]> (Merged from https://github.com/openssl/openssl/pull/13728)
fdf05eb7611a1fdb283162228985286a09d07940
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/fdf05eb7611a1fdb283162228985286a09d07940
2020-12-22 09:40:46+01:00
DOCS: Add documentation for EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md_name() At the same, align documentation markup to be closer to man-pages(7) recommendations. Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/12188)
22063850586945fd98ad3656df21c16adfef89ae
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/22063850586945fd98ad3656df21c16adfef89ae
2020-06-18 12:28:36+02:00
Fix DHE Null CKE vulnerability If client auth is used then a server can seg fault in the event of a DHE cipher being used and a zero length ClientKeyExchange message being sent by the client. This could be exploited in a DoS attack. CVE-2015-1787 Reviewed-by: Richard Levitte <[email protected]>
d3cc5e610d1719a35cda52c9152134b490a8c944
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/d3cc5e610d1719a35cda52c9152134b490a8c944
2015-03-10 16:38:32+00:00
correct spelling errors detected by Debian lintian CLA: trivial Reviewed-by: Matthias St. Pierre <[email protected]> Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/5801)
aa3b328541ff67dde7c40ae73dd11a296647ae3d
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/aa3b328541ff67dde7c40ae73dd11a296647ae3d
2018-03-29 22:10:26+02:00
Add documentation for the newly added EVP_PKEY_new*() functions Also adds some documentation for related existing functions/macros Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/5520)
d45a97f475d944c9d4ce1103fb1d3f3a68ccd8cd
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/d45a97f475d944c9d4ce1103fb1d3f3a68ccd8cd
2018-03-05 17:41:49+00:00
crypto/evp: harden AEAD ciphers. Originally a crash in 32-bit build was reported CHACHA20-POLY1305 cipher. The crash is triggered by truncated packet and is result of excessive hashing to the edge of accessible memory. Since hash operation is read-only it is not considered to be exploitable beyond a DoS condition. Other ciphers were hardened. Thanks to Robert Święcki for report. CVE-2017-3731 Reviewed-by: Rich Salz <[email protected]>
2198b3a55de681e1f3c23edb0586afe13f438051
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/2198b3a55de681e1f3c23edb0586afe13f438051
2017-01-19 00:20:49+01:00
Add test for CVE-2020-1967 Add to test_sslsigalgs a TLSProxy test that injects a "signature_algorithms_cert" extension that contains an unallocated codepoint. The test currently fails, since s_server segfaults instead of ignoring the unrecognized value. Since "signature_algorithms" and "signature_algorithms_cert" are very similar, also add the analogous test for "signature_algorithms". Reviewed-by: Matt Caswell <[email protected]>
3656c08ab4b1b892730cb5e808b6f4298b08a2e6
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/3656c08ab4b1b892730cb5e808b6f4298b08a2e6
2020-04-10 12:27:28-07:00
Add documentation for SSL version methods [skip ci] Reviewed-by: Rich Salz <[email protected]> Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3049)
86fde069d484188117a21563baf17e4ed0a4eeef
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/86fde069d484188117a21563baf17e4ed0a4eeef
2017-03-28 15:33:54+10:00
Add documentation for BN_with_flags Following on from the previous commit this adds some documentation for the BN_with_flags function which is easy to misuse. Reviewed-by: Emilia Käsper <[email protected]>
e113c9c59dcb419dd00525cec431edb854a6c897
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/e113c9c59dcb419dd00525cec431edb854a6c897
2015-11-24 16:08:34+00:00
Add documentation for the storeutl app Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3542)
8f507bc5d5fa3b848acb3db8618b55b5f643f6b3
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/8f507bc5d5fa3b848acb3db8618b55b5f643f6b3
2016-12-13 13:47:13+01:00
Improve documentation, layout, and code comments regarding self-issued certs etc. Reviewed-by: Viktor Dukhovni <[email protected]> (Merged from https://github.com/openssl/openssl/pull/10587)
ade08735f9d0ac85d611c5abee8a1df651bbca13
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/ade08735f9d0ac85d611c5abee8a1df651bbca13
2019-12-23 15:40:47+01:00
Improve error reporting in key exchange provider implementations Added some error reporting in dh_exch.c and unified error reporting with it in other key exchange methods. Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/14367)
77b03f0e8fd97a57f84294d085e7730de5b4da4c
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/77b03f0e8fd97a57f84294d085e7730de5b4da4c
2021-03-01 16:07:15+01:00
Prevent DTLS Finished message injection Follow on from CVE-2016-2179 The investigation and analysis of CVE-2016-2179 highlighted a related flaw. This commit fixes a security "near miss" in the buffered message handling code. Ultimately this is not currently believed to be exploitable due to the reasons outlined below, and therefore there is no CVE for this on its own. The issue this commit fixes is a MITM attack where the attacker can inject a Finished message into the handshake. In the description below it is assumed that the attacker injects the Finished message for the server to receive it. The attack could work equally well the other way around (i.e where the client receives the injected Finished message). The MITM requires the following capabilities: - The ability to manipulate the MTU that the client selects such that it is small enough for the client to fragment Finished messages. - The ability to selectively drop and modify records sent from the client - The ability to inject its own records and send them to the server The MITM forces the client to select a small MTU such that the client will fragment the Finished message. Ideally for the attacker the first fragment will contain all but the last byte of the Finished message, with the second fragment containing the final byte. During the handshake and prior to the client sending the CCS the MITM injects a plaintext Finished message fragment to the server containing all but the final byte of the Finished message. The message sequence number should be the one expected to be used for the real Finished message. OpenSSL will recognise that the received fragment is for the future and will buffer it for later use. After the client sends the CCS it then sends its own Finished message in two fragments. The MITM causes the first of these fragments to be dropped. The OpenSSL server will then receive the second of the fragments and reassemble the complete Finished message consisting of the MITM fragment and the final byte from the real client. The advantage to the attacker in injecting a Finished message is that this provides the capability to modify other handshake messages (e.g. the ClientHello) undetected. A difficulty for the attacker is knowing in advance what impact any of those changes might have on the final byte of the handshake hash that is going to be sent in the "real" Finished message. In the worst case for the attacker this means that only 1 in 256 of such injection attempts will succeed. It may be possible in some situations for the attacker to improve this such that all attempts succeed. For example if the handshake includes client authentication then the final message flight sent by the client will include a Certificate. Certificates are ASN.1 objects where the signed portion is DER encoded. The non-signed portion could be BER encoded and so the attacker could re-encode the certificate such that the hash for the whole handshake comes to a different value. The certificate re-encoding would not be detectable because only the non-signed portion is changed. As this is the final flight of messages sent from the client the attacker knows what the complete hanshake hash value will be that the client will send - and therefore knows what the final byte will be. Through a process of trial and error the attacker can re-encode the certificate until the modified handhshake also has a hash with the same final byte. This means that when the Finished message is verified by the server it will be correct in all cases. In practice the MITM would need to be able to perform the same attack against both the client and the server. If the attack is only performed against the server (say) then the server will not detect the modified handshake, but the client will and will abort the connection. Fortunately, although OpenSSL is vulnerable to Finished message injection, it is not vulnerable if *both* client and server are OpenSSL. The reason is that OpenSSL has a hard "floor" for a minimum MTU size that it will never go below. This minimum means that a Finished message will never be sent in a fragmented form and therefore the MITM does not have one of its pre-requisites. Therefore this could only be exploited if using OpenSSL and some other DTLS peer that had its own and separate Finished message injection flaw. The fix is to ensure buffered messages are cleared on epoch change. Reviewed-by: Richard Levitte <[email protected]>
5cb4d6466a14665f8cd659b6dd7746183f2c60bd
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/5cb4d6466a14665f8cd659b6dd7746183f2c60bd
2016-06-30 15:06:27+01:00
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <[email protected]>
34e3edbf3a10953cb407288101fd56a629af22f9
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/34e3edbf3a10953cb407288101fd56a629af22f9
2015-03-03 13:20:57+00:00
Fix GENERAL_NAME_cmp for x400Address (master) CVE-2023-0286 Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Tomas Mraz <[email protected]>
7880536fe17c2b5450e279155bedd51771d28c9f
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/7880536fe17c2b5450e279155bedd51771d28c9f
2023-01-17 17:45:42+00:00
add test for CVE-2016-7053 Reviewed-by: Richard Levitte <[email protected]>
a378a46985698bf2576b2990e7faf21f62dd176a
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/a378a46985698bf2576b2990e7faf21f62dd176a
2016-10-14 12:02:12+01:00
Add documentation for some of the missing environment variables. Where document already exists, it has been linked to. Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Dmitry Belyavskiy <[email protected]> (Merged from https://github.com/openssl/openssl/pull/17044)
7f6496275157f8e40f544f75a223c2c0dc6b389e
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/7f6496275157f8e40f544f75a223c2c0dc6b389e
2021-11-16 10:31:44+10:00
Fix a failure to NULL a pointer freed on error. Reported by the LibreSSL project as a follow on to CVE-2015-0209 Reviewed-by: Richard Levitte <[email protected]>
5e5d53d341fd9a9b9cc0a58eb3690832ca7a511f
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/5e5d53d341fd9a9b9cc0a58eb3690832ca7a511f
2015-03-19 10:16:32+00:00
doc: add documentation for TLS13_KDF Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: Shane Lontis <[email protected]> (Merged from https://github.com/openssl/openssl/pull/16203)
94eb3cdd34bf391f50a59bbfcc6cb83138a77261
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/94eb3cdd34bf391f50a59bbfcc6cb83138a77261
2021-08-02 21:44:38+10:00
Remove broken DSA private key workarounds. Remove old code that handled various invalid DSA formats in ancient software. This also fixes a double free bug when parsing malformed DSA private keys. Thanks to Adam Langley (Google/BoringSSL) for discovering this bug using libFuzzer. CVE-2016-0705 Reviewed-by: Emilia Käsper <[email protected]>
ab4a81f69ec88d06c9d8de15326b9296d7f498ed
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/ab4a81f69ec88d06c9d8de15326b9296d7f498ed
2016-02-18 13:09:24+00:00
Add documentation for EVP_EncodeInit() and similar functions Reviewed-by: Richard Levitte <[email protected]>
d202a602e07b7090e3e5d75216b47cc7eb6fd4b6
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/d202a602e07b7090e3e5d75216b47cc7eb6fd4b6
2016-04-25 11:54:30+01:00
a_strex.c: improve documentation of 'tag2nbyte' lookup table The 'tag2nbyte' lookup table maps the tags of ASN1 string types to their respective character widths. It is used for example by ASN1_STRING_to_UTF8(). This commit adds the tag names as comments. Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/6062)
d8f436f3cf771d519573460b14ece6ed01a157ff
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/d8f436f3cf771d519573460b14ece6ed01a157ff
2018-04-20 17:55:02+02:00
Add documentation for the -no_alt_chains option for various apps, as well as the X509_V_FLAG_NO_ALT_CHAINS flag. Reviewed-by: Dr. Stephen Henson <[email protected]>
fa7b01115bc33d9b40936688bb3c952dc93b645a
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/fa7b01115bc33d9b40936688bb3c952dc93b645a
2015-01-27 11:15:15+00:00
RT3809: basicConstraints is critical This is really a security bugfix, not enhancement any more. Everyone knows critical extensions. Reviewed-by: Dr. Stephen Henson <[email protected]>
a7be5759cf9d8e2bf7c1ecd0efa2d53aae9ab706
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/a7be5759cf9d8e2bf7c1ecd0efa2d53aae9ab706
2016-06-12 22:21:54-04:00
Add documentation for the Asymmetric Cipher Operation Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/10152)
11d876df50d90ec4b26364c4b7d317ea19139e13
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/11d876df50d90ec4b26364c4b7d317ea19139e13
2019-10-29 09:24:24+00:00
crypto/*: Fix various typos, repeated words, align some spelling to LDP. partially revamped from #16712 - fall thru -> fall through - time stamp -> timestamp - host name -> hostname - ipv6 -> IPv6 Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/19059)
c7340583097a80a4fe42bacea745b2bbaa6d16db
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/c7340583097a80a4fe42bacea745b2bbaa6d16db
2022-08-23 20:37:03+02:00
Add documentation for SSL_stateless() Fixes #4283 Reviewed-by: Ben Kaduk <[email protected]> (Merged from https://github.com/openssl/openssl/pull/4435)
1e6122774a75ee4a59b5de129eac122222905b52
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/1e6122774a75ee4a59b5de129eac122222905b52
2017-09-28 15:05:58+01:00
Add documentation of the old names kept as alias macros Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/15405)
31b7f23d2f958491d46c8a8e61c2b77b1b546f3e
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/31b7f23d2f958491d46c8a8e61c2b77b1b546f3e
2021-05-28 17:36:16+02:00
QUIC: Add documentation for stream and connection shutdown functions Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/19897)
522fb49dbcd283c00c77ebcc7a650c54ac6eba5b
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/522fb49dbcd283c00c77ebcc7a650c54ac6eba5b
2023-01-05 08:35:07+00:00
Fix a possible memleak If there's a failure allocating md_data, the destination pctx will have a shared pointer with the source EVP_MD_CTX, which will lead to problems when either the source or the destination is freed. Reviewed-by: Stephen Henson <[email protected]>
6aa0ba4bb2833b1e0d6ae98c54c79bfed8257c3a
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/6aa0ba4bb2833b1e0d6ae98c54c79bfed8257c3a
2015-12-18 13:03:45+01:00
Update documentation Add documentation for EVP_DigestSignInit_ex() and EVP_DigestVerifyInit_ex(), and add an appropriate CHANGES entry. Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/10013)
a0b6c1ffd0261152c523c5c000e9c025b39fd630
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/a0b6c1ffd0261152c523c5c000e9c025b39fd630
2019-09-23 16:43:08+01:00
Add documentation for CPUID bit #64+17 CLA: trivial Reviewed-by: Hugo Landau <[email protected]> Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/19670)
ec7689186f3ea5c1a4d1564089cd8df287dfcf3c
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/ec7689186f3ea5c1a4d1564089cd8df287dfcf3c
2022-11-14 12:56:32+01:00
Add documentation for SSL_SESSION_set_max_early_data() Reviewed-by: Ben Kaduk <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3926)
e17e1df77e651e557ad8fc67e2bea0bbcf98f153
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/e17e1df77e651e557ad8fc67e2bea0bbcf98f153
2017-07-13 18:02:18+01:00
v2i_AUTHORITY_KEYID(): Improve error reporting on parsing config values/options Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/16345)
6e98b7f153fcf9dfad1053fbb3a592166837c6fc
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/6e98b7f153fcf9dfad1053fbb3a592166837c6fc
2021-08-17 19:12:55+02:00
Few cleanups in s_client, s_server apps. Discard useless static engine_id Add a const qualifier Fix some spelling Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Matt Caswell <[email protected]>
bde136c89f87b66d49e9d03e3b34c68b6b1d1e26
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/bde136c89f87b66d49e9d03e3b34c68b6b1d1e26
2016-03-18 19:02:17+01:00