1. 06 12月, 2019 1 次提交
    • A
      Fix an overflow bug in rsaz_512_sqr · 41910240
      Andy Polyakov 提交于
      There is an overflow bug in the x64_64 Montgomery squaring procedure used in
      exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis
      suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a
      result of this defect would be very difficult to perform and are not believed
      likely. Attacks against DH512 are considered just feasible. However, for an
      attack the target would have to re-use the DH512 private key, which is not
      recommended anyway. Also applications directly using the low level API
      BN_mod_exp may be affected if they use BN_FLG_CONSTTIME.
      
      CVE-2019-1551
      Reviewed-by: NPaul Dale <paul.dale@oracle.com>
      Reviewed-by: NBernd Edlinger <bernd.edlinger@hotmail.de>
      (Merged from https://github.com/openssl/openssl/pull/10575)
      41910240
  2. 05 12月, 2019 2 次提交
  3. 03 12月, 2019 1 次提交
  4. 29 11月, 2019 3 次提交
  5. 28 11月, 2019 2 次提交
  6. 27 11月, 2019 1 次提交
  7. 22 11月, 2019 3 次提交
  8. 21 11月, 2019 3 次提交
  9. 20 11月, 2019 2 次提交
  10. 17 11月, 2019 2 次提交
  11. 15 11月, 2019 2 次提交
  12. 14 11月, 2019 4 次提交
  13. 13 11月, 2019 1 次提交
  14. 12 11月, 2019 2 次提交
  15. 11 11月, 2019 1 次提交
  16. 10 11月, 2019 1 次提交
  17. 09 11月, 2019 2 次提交
  18. 06 11月, 2019 2 次提交
  19. 04 11月, 2019 1 次提交
  20. 03 11月, 2019 1 次提交
  21. 02 11月, 2019 2 次提交
  22. 01 11月, 2019 1 次提交