Skip to content
  1. Jun 05, 2014
  2. Jun 03, 2014
    • Dr. Stephen Henson's avatar
      Fix CVE-2014-3470 · 8250e1b2
      Dr. Stephen Henson authored
      Check session_cert is not NULL before dereferencing it.
      8250e1b2
    • Dr. Stephen Henson's avatar
      Fix CVE-2014-0221 · 519c977c
      Dr. Stephen Henson authored
      Unnecessary recursion when receiving a DTLS hello request can be used to
      crash a DTLS client. Fixed by handling DTLS hello request without recursion.
      
      Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue.
      519c977c
    • Dr. Stephen Henson's avatar
      Additional CVE-2014-0224 protection. · 123370fb
      Dr. Stephen Henson authored
      Return a fatal error if an attempt is made to use a zero length
      master secret.
      123370fb
    • Dr. Stephen Henson's avatar
      Fix for CVE-2014-0224 · c97e457d
      Dr. Stephen Henson authored
      Only accept change cipher spec when it is expected instead of at any
      time. This prevents premature setting of session keys before the master
      secret is determined which an attacker could use as a MITM attack.
      
      Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue
      and providing the initial fix this patch is based on.
      c97e457d
    • Dr. Stephen Henson's avatar
      Fix for CVE-2014-0195 · f4e6ed09
      Dr. Stephen Henson authored
      A buffer overrun attack can be triggered by sending invalid DTLS fragments
      to an OpenSSL DTLS client or server. This is potentially exploitable to
      run arbitrary code on a vulnerable client or server.
      
      Fixed by adding consistency check for DTLS fragments.
      
      Thanks to Jüri Aedla for reporting this issue.
      f4e6ed09
  3. Jun 02, 2014
    • zhu qun-ying's avatar
      Free up s->d1->buffered_app_data.q properly. · b79e6e3a
      zhu qun-ying authored
      PR#3286
      (cherry picked from commit 71e95000afb2227fe5cac1c79ae884338bcd8d0b)
      b79e6e3a
    • Dr. Stephen Henson's avatar
      Make PKCS7_NOCERTS match documentation. · 812b7246
      Dr. Stephen Henson authored
      As documented PKCS7_NOCERTS should only exclude the signer's certificate
      and not any supplied in the "certs" parameter. This makes it possible to
      exclude the signer's certificate but include other certificates. Applications
      that don't want to include other certificates should set "certs" to NULL
      anyway.
      (cherry picked from commit 5c6f808b66f1a2e0fb2a508b24b845a88803fe3a)
      812b7246
    • Annie Yousar's avatar
      Fix typo. · db305124
      Annie Yousar authored
      PR#2677.
      db305124
    • Sami Farin's avatar
      Typo: set i to -1 before goto. · bffbaf92
      Sami Farin authored
      PR#3302
      (cherry picked from commit 9717f01951f976f76dd40a38d9fc7307057fa4c4)
      bffbaf92
  4. Jun 01, 2014
  5. May 30, 2014
  6. May 29, 2014
  7. May 27, 2014
  8. May 25, 2014
  9. May 24, 2014
  10. May 21, 2014
  11. May 19, 2014
  12. May 15, 2014
  13. May 14, 2014
  14. May 12, 2014
  15. May 11, 2014
  16. May 09, 2014
    • Dr. Stephen Henson's avatar
      Return an error if no recipient type matches. · c3cd9be0
      Dr. Stephen Henson authored
      If the key type does not match any CMS recipient type return
      an error instead of using a random key (MMA mitigation). This
      does not leak any useful information to an attacker.
      
      PR#3348
      (cherry picked from commit 83a3182e0560f76548f4378325393461f6275493)
      c3cd9be0