1. 16 Jun, 2014 2 commits
  2. 14 Jun, 2014 5 commits
  3. 13 Jun, 2014 2 commits
  4. 12 Jun, 2014 5 commits
  5. 11 Jun, 2014 4 commits
  6. 10 Jun, 2014 6 commits
  7. 09 Jun, 2014 2 commits
  8. 08 Jun, 2014 2 commits
  9. 07 Jun, 2014 3 commits
  10. 06 Jun, 2014 6 commits
  11. 05 Jun, 2014 3 commits
    • Dr. Stephen Henson's avatar
      Update value to use a free bit. · 5111672b
      Dr. Stephen Henson authored
      5111672b
    • Dr. Stephen Henson's avatar
      Fix for CVE-2014-0195 · 410e444b
      Dr. Stephen Henson authored
      A buffer overrun attack can be triggered by sending invalid DTLS fragments
      to an OpenSSL DTLS client or server. This is potentially exploitable to
      run arbitrary code on a vulnerable client or server.
      
      Fixed by adding consistency check for DTLS fragments.
      
      Thanks to Jüri Aedla for reporting this issue.
      (cherry picked from commit 1632ef74)
      410e444b
    • Dr. Stephen Henson's avatar
      Fix for CVE-2014-0224 · a91be108
      Dr. Stephen Henson authored
      Only accept change cipher spec when it is expected instead of at any
      time. This prevents premature setting of session keys before the master
      secret is determined which an attacker could use as a MITM attack.
      
      Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue
      and providing the initial fix this patch is based on.
      (cherry picked from commit bc8923b1)
      a91be108