Skip to content
  1. Apr 16, 2015
  2. Apr 14, 2015
    • Matt Caswell's avatar
      Fix ssl_get_prev_session overrun · 4bbff0f9
      Matt Caswell authored
      
      
      If OpenSSL is configured with no-tlsext then ssl_get_prev_session can read
      past the end of the ClientHello message if the session_id length in the
      ClientHello is invalid. This should not cause any security issues since the
      underlying buffer is 16k in size. It should never be possible to overrun by
      that many bytes.
      
      This is probably made redundant by the previous commit - but you can never be
      too careful.
      
      With thanks to Qinghao Tang for reporting this issue.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      (cherry picked from commit 5e0a80c1)
      
      Conflicts:
      	ssl/ssl_sess.c
      4bbff0f9
    • Matt Caswell's avatar
      Check for ClientHello message overruns · 923552bd
      Matt Caswell authored
      
      
      The ClientHello processing is insufficiently rigorous in its checks to make
      sure that we don't read past the end of the message. This does not have
      security implications due to the size of the underlying buffer - but still
      needs to be fixed.
      
      With thanks to Qinghao Tang for reporting this issue.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      (cherry picked from commit c9642eb1ff79a30e2c7632ef8267cc34cc2b0d79)
      923552bd
  3. Apr 10, 2015
    • Dr. Stephen Henson's avatar
      Don't set *pval to NULL in ASN1_item_ex_new. · dafa9534
      Dr. Stephen Henson authored
      
      
      While *pval is usually a pointer in rare circumstances it can be a long
      value. One some platforms (e.g. WIN64) where
      sizeof(long) < sizeof(ASN1_VALUE *) this will write past the field.
      
      *pval is initialised correctly in the rest of ASN1_item_ex_new so setting it
      to NULL is unecessary anyway.
      
      Thanks to Julien Kauffmann for reporting this issue.
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      (cherry picked from commit f617b496)
      
      Conflicts:
      	crypto/asn1/tasn_new.c
      dafa9534
  4. Mar 24, 2015
  5. Mar 19, 2015
  6. Mar 18, 2015
  7. Mar 12, 2015
  8. Mar 11, 2015
  9. Mar 09, 2015
  10. Mar 08, 2015
  11. Mar 07, 2015
  12. Mar 06, 2015
  13. Mar 02, 2015
  14. Feb 25, 2015
  15. Feb 24, 2015
  16. Feb 09, 2015
  17. Feb 06, 2015
  18. Feb 05, 2015
  19. Feb 04, 2015
  20. Feb 03, 2015
  21. Jan 22, 2015