1. 22 Jan, 2015 19 commits
  2. 14 Jan, 2015 1 commit
    • Rich Salz's avatar
      Cleanup OPENSSL_NO_xxx, part 1 · 4b618848
      Rich Salz authored
      
      
      OPENSSL_NO_RIPEMD160, OPENSSL_NO_RIPEMD merged into OPENSSL_NO_RMD160
      OPENSSL_NO_FP_API merged into OPENSSL_NO_STDIO
      Two typo's on #endif comments fixed:
      	OPENSSL_NO_ECB fixed to OPENSSL_NO_OCB
      	OPENSSL_NO_HW_SureWare fixed to OPENSSL_NO_HW_SUREWARE
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      4b618848
  3. 13 Jan, 2015 7 commits
  4. 12 Jan, 2015 7 commits
  5. 10 Jan, 2015 1 commit
  6. 09 Jan, 2015 2 commits
  7. 08 Jan, 2015 3 commits
    • Matt Caswell's avatar
    • Matt Caswell's avatar
      A memory leak can occur in dtls1_buffer_record if either of the calls to · 103b171d
      Matt Caswell authored
      
      ssl3_setup_buffers or pqueue_insert fail. The former will fail if there is a
      malloc failure, whilst the latter will fail if attempting to add a duplicate
      record to the queue. This should never happen because duplicate records should
      be detected and dropped before any attempt to add them to the queue.
      Unfortunately records that arrive that are for the next epoch are not being
      recorded correctly, and therefore replays are not being detected.
      Additionally, these "should not happen" failures that can occur in
      dtls1_buffer_record are not being treated as fatal and therefore an attacker
      could exploit this by sending repeated replay records for the next epoch,
      eventually causing a DoS through memory exhaustion.
      
      Thanks to Chris Mueller for reporting this issue and providing initial
      analysis and a patch. Further analysis and the final patch was performed by
      Matt Caswell from the OpenSSL development team.
      
      CVE-2015-0206
      
      Reviewed-by: default avatarDr Stephen Henson <steve@openssl.org>
      103b171d
    • Dr. Stephen Henson's avatar
      Unauthenticated DH client certificate fix. · 1421e0c5
      Dr. Stephen Henson authored
      
      
      Fix to prevent use of DH client certificates without sending
      certificate verify message.
      
      If we've used a client certificate to generate the premaster secret
      ssl3_get_client_key_exchange returns 2 and ssl3_get_cert_verify is
      never called.
      
      We can only skip the certificate verify message in
      ssl3_get_cert_verify if the client didn't send a certificate.
      
      Thanks to Karthikeyan Bhargavan for reporting this issue.
      CVE-2015-0205
      Reviewed-by: default avatarMatt Caswell <matt@openssl.org>
      1421e0c5