Skip to content
  1. Jun 28, 2014
  2. Jun 27, 2014
  3. Jun 26, 2014
  4. Jun 22, 2014
  5. Jun 14, 2014
    • Dr. Stephen Henson's avatar
      Accept CCS after sending finished. · f25e4263
      Dr. Stephen Henson authored
      Allow CCS after finished has been sent by client: at this point
      keys have been correctly set up so it is OK to accept CCS from
      server. Without this renegotiation can sometimes fail.
      
      PR#3400
      (cherry picked from commit 99cd6a91fcb0931feaebbb4832681d40a66fad41)
      f25e4263
  6. Jun 13, 2014
  7. Jun 12, 2014
  8. Jun 11, 2014
  9. Jun 10, 2014
  10. Jun 09, 2014
  11. Jun 08, 2014
    • Jakub Wilk's avatar
      Create ~/.rnd with mode 0600 instead of 0666 · 8781538f
      Jakub Wilk authored
      Because of a missing include <fcntl.h> we don't have O_CREATE and don't create
      the file with open() using mode 0600 but fall back to using fopen() with the
      default umask followed by a chmod().
      
      Problem found by Jakub Wilk <jwilk@debian.org>.
      8781538f
  12. Jun 07, 2014
  13. Jun 06, 2014
  14. Jun 05, 2014
  15. Jun 03, 2014
    • Dr. Stephen Henson's avatar
      Fix CVE-2014-3470 · 8250e1b2
      Dr. Stephen Henson authored
      Check session_cert is not NULL before dereferencing it.
      8250e1b2
    • Dr. Stephen Henson's avatar
      Fix CVE-2014-0221 · 519c977c
      Dr. Stephen Henson authored
      Unnecessary recursion when receiving a DTLS hello request can be used to
      crash a DTLS client. Fixed by handling DTLS hello request without recursion.
      
      Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue.
      519c977c
    • Dr. Stephen Henson's avatar
      Additional CVE-2014-0224 protection. · 123370fb
      Dr. Stephen Henson authored
      Return a fatal error if an attempt is made to use a zero length
      master secret.
      123370fb
    • Dr. Stephen Henson's avatar
      Fix for CVE-2014-0224 · c97e457d
      Dr. Stephen Henson authored
      Only accept change cipher spec when it is expected instead of at any
      time. This prevents premature setting of session keys before the master
      secret is determined which an attacker could use as a MITM attack.
      
      Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue
      and providing the initial fix this patch is based on.
      c97e457d
    • Dr. Stephen Henson's avatar
      Fix for CVE-2014-0195 · f4e6ed09
      Dr. Stephen Henson authored
      A buffer overrun attack can be triggered by sending invalid DTLS fragments
      to an OpenSSL DTLS client or server. This is potentially exploitable to
      run arbitrary code on a vulnerable client or server.
      
      Fixed by adding consistency check for DTLS fragments.
      
      Thanks to Jüri Aedla for reporting this issue.
      f4e6ed09