Skip to content
  1. Jun 04, 2015
    • Matt Caswell's avatar
      Fix off-by-one error in BN_bn2hex · c5635307
      Matt Caswell authored
      
      
      A BIGNUM can have the value of -0. The function BN_bn2hex fails to account
      for this and can allocate a buffer one byte too short in the event of -0
      being used, leading to a one byte buffer overrun. All usage within the
      OpenSSL library is considered safe. Any security risk is considered
      negligible.
      
      With thanks to Mateusz Kocielski (LogicalTrust), Marek Kroemeke and
      Filip Palian for discovering and reporting this issue.
      
      Reviewed-by: default avatarTim Hudson <tjh@openssl.org>
      c5635307
    • Matt Caswell's avatar
      Fix DTLS session resumption · 7322abf5
      Matt Caswell authored
      
      
      The session object on the client side is initially created during
      construction of the ClientHello. If the client is DTLS1.2 capable then it
      will store 1.2 as the version for the session. However if the server is only
      DTLS1.0 capable then when the ServerHello comes back the client switches to
      using DTLS1.0 from then on. However the session version does not get
      updated. Therefore when the client attempts to resume that session the
      server throws an alert because of an incorrect protocol version.
      
      Reviewed-by: default avatarTim Hudson <tjh@openssl.org>
      7322abf5
  2. Jun 03, 2015
  3. Jun 02, 2015
  4. May 31, 2015
  5. May 30, 2015
  6. May 29, 2015
  7. May 28, 2015
  8. May 27, 2015
  9. May 26, 2015