and though bugs are the bane of my existence, rest assured the wretched thing will get the best of care here

This project is mirrored from https://github.com/openssl/openssl.git. Pull mirroring failed .
Last successful update .
  1. 21 Apr, 2020 5 commits
    • Matt Caswell's avatar
      Prepare for 1.1.1g release · e2e09d9f
      Matt Caswell authored
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      e2e09d9f
    • Matt Caswell's avatar
      Update copyright year · a1ec85c1
      Matt Caswell authored
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      a1ec85c1
    • Benjamin Kaduk's avatar
      Fix NULL dereference in SSL_check_chain() for TLS 1.3 · eb563247
      Benjamin Kaduk authored
      In the tls1_check_sig_alg() helper function, we loop through the list of
      "signature_algorithms_cert" values received from the client and attempt
      to look up each one in turn in our internal table that maps wire
      codepoint to string-form name, digest and/or signature NID, etc., in
      order to compare the signature scheme from the peer's list against what
      is used to sign the certificates in the certificate chain we're
      checking.  Unfortunately, when the peer sends a value that we don't
      support, the lookup returns NULL, but we unconditionally dereference the
      lookup result for the comparison, leading to an application crash
      triggerable by an unauthenticated client.
      
      Since we will not be able to say anything about algorithms we don't
      recognize, treat NULL return from lookup as "does not match".
      
      We currently only apply the "signature_algorithm_cert" checks on TLS 1.3
      connections, so previous TLS versions are unaffected.  SSL_check_chain()
      is not called directly from libssl, but may be used by the application
      inside a callback (e.g., client_hello or cert callback) to verify that a
      candidate certificate chain will be acceptable to the client.
      
      CVE-2020-1967
      Reviewed-by: default avatarMatt Caswell <matt@openssl.org>
      eb563247
    • Benjamin Kaduk's avatar
      Add test for CVE-2020-1967 · 64eef867
      Benjamin Kaduk authored
      Add to test_sslsigalgs a TLSProxy test that injects a
      "signature_algorithms_cert" extension that contains an unallocated
      codepoint.
      
      The test currently fails, since s_server segfaults instead of
      ignoring the unrecognized value.
      
      Since "signature_algorithms" and "signature_algorithms_cert" are very
      similar, also add the analogous test for "signature_algorithms".
      Reviewed-by: default avatarMatt Caswell <matt@openssl.org>
      64eef867
    • Matt Caswell's avatar
      23424be8
  2. 18 Apr, 2020 2 commits
  3. 17 Apr, 2020 3 commits
  4. 14 Apr, 2020 1 commit
  5. 12 Apr, 2020 1 commit
  6. 11 Apr, 2020 1 commit
  7. 09 Apr, 2020 2 commits
  8. 08 Apr, 2020 1 commit
  9. 07 Apr, 2020 4 commits
  10. 06 Apr, 2020 3 commits
  11. 03 Apr, 2020 1 commit
  12. 01 Apr, 2020 2 commits
  13. 31 Mar, 2020 3 commits
  14. 29 Mar, 2020 1 commit
  15. 25 Mar, 2020 2 commits
  16. 24 Mar, 2020 1 commit
  17. 22 Mar, 2020 1 commit
  18. 20 Mar, 2020 1 commit
  19. 19 Mar, 2020 4 commits
  20. 17 Mar, 2020 1 commit