1. 08 Jan, 2015 5 commits
    • Matt Caswell's avatar
      A memory leak can occur in dtls1_buffer_record if either of the calls to · 04685bc9
      Matt Caswell authored
      
      ssl3_setup_buffers or pqueue_insert fail. The former will fail if there is a
      malloc failure, whilst the latter will fail if attempting to add a duplicate
      record to the queue. This should never happen because duplicate records should
      be detected and dropped before any attempt to add them to the queue.
      Unfortunately records that arrive that are for the next epoch are not being
      recorded correctly, and therefore replays are not being detected.
      Additionally, these "should not happen" failures that can occur in
      dtls1_buffer_record are not being treated as fatal and therefore an attacker
      could exploit this by sending repeated replay records for the next epoch,
      eventually causing a DoS through memory exhaustion.
      
      Thanks to Chris Mueller for reporting this issue and providing initial
      analysis and a patch. Further analysis and the final patch was performed by
      Matt Caswell from the OpenSSL development team.
      
      CVE-2015-0206
      
      Reviewed-by: default avatarDr Stephen Henson <steve@openssl.org>
      04685bc9
    • Dr. Stephen Henson's avatar
      Unauthenticated DH client certificate fix. · 98a0f966
      Dr. Stephen Henson authored
      
      
      Fix to prevent use of DH client certificates without sending
      certificate verify message.
      
      If we've used a client certificate to generate the premaster secret
      ssl3_get_client_key_exchange returns 2 and ssl3_get_cert_verify is
      never called.
      
      We can only skip the certificate verify message in
      ssl3_get_cert_verify if the client didn't send a certificate.
      
      Thanks to Karthikeyan Bhargavan for reporting this issue.
      CVE-2015-0205
      Reviewed-by: default avatarMatt Caswell <matt@openssl.org>
      98a0f966
    • Matt Caswell's avatar
      Follow on from CVE-2014-3571. This fixes the code that was the original source · 45fe66b8
      Matt Caswell authored
      
      of the crash due to p being NULL. Steve's fix prevents this situation from
      occuring - however this is by no means obvious by looking at the code for
      dtls1_get_record. This fix just makes things look a bit more sane.
      
      Reviewed-by: default avatarDr Steve Henson <steve@openssl.org>
      45fe66b8
    • Dr. Stephen Henson's avatar
      Fix crash in dtls1_get_record whilst in the listen state where you get two · 8d7aab98
      Dr. Stephen Henson authored
      
      separate reads performed - one for the header and one for the body of the
      handshake record.
      
      CVE-2014-3571
      
      Reviewed-by: default avatarMatt Caswell <matt@openssl.org>
      8d7aab98
    • Andy Polyakov's avatar
      Fix for CVE-2014-3570. · e078642d
      Andy Polyakov authored
      
      
      Reviewed-by: default avatarEmilia Kasper <emilia@openssl.org>
      (cherry picked from commit e793809ba50c1e90ab592fb640a856168e50f3de)
      (with 1.0.1-specific addendum)
      e078642d
  2. 07 Jan, 2015 3 commits
  3. 06 Jan, 2015 6 commits
  4. 05 Jan, 2015 5 commits
  5. 04 Jan, 2015 1 commit
  6. 02 Jan, 2015 1 commit
  7. 31 Dec, 2014 1 commit
  8. 30 Dec, 2014 4 commits
  9. 22 Dec, 2014 2 commits
  10. 20 Dec, 2014 1 commit
  11. 19 Dec, 2014 1 commit
  12. 18 Dec, 2014 1 commit
  13. 17 Dec, 2014 9 commits