1. 19 Mar, 2015 4 commits
    • Matt Caswell's avatar
      Remove overlapping CHANGES/NEWS entries · 66e20354
      Matt Caswell authored
      
      
      Remove entries from CHANGES and NEWS from letter releases that occur *after*
      the next point release. Without this we get duplicate entries for the same
      issue appearing multiple times.
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      66e20354
    • Emilia Kasper's avatar
      Fix reachable assert in SSLv2 servers. · 1a08063a
      Emilia Kasper authored
      
      
      This assert is reachable for servers that support SSLv2 and export ciphers.
      Therefore, such servers can be DoSed by sending a specially crafted
      SSLv2 CLIENT-MASTER-KEY.
      
      Also fix s2_srvr.c to error out early if the key lengths are malformed.
      These lengths are sent unencrypted, so this does not introduce an oracle.
      
      CVE-2015-0293
      
      This issue was discovered by Sean Burford (Google) and Emilia Käsper of
      the OpenSSL development team.
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      Reviewed-by: default avatarTim Hudson <tjh@openssl.org>
      1a08063a
    • Emilia Kasper's avatar
      PKCS#7: avoid NULL pointer dereferences with missing content · 9104dc42
      Emilia Kasper authored
      
      
      In PKCS#7, the ASN.1 content component is optional.
      This typically applies to inner content (detached signatures),
      however we must also handle unexpected missing outer content
      correctly.
      
      This patch only addresses functions reachable from parsing,
      decryption and verification, and functions otherwise associated
      with reading potentially untrusted data.
      
      Correcting all low-level API calls requires further work.
      
      CVE-2015-0289
      
      Thanks to Michal Zalewski (Google) for reporting this issue.
      
      Reviewed-by: default avatarSteve Henson <steve@openssl.org>
      9104dc42
    • Dr. Stephen Henson's avatar
      Fix ASN1_TYPE_cmp · 02758836
      Dr. Stephen Henson authored
      
      
      Fix segmentation violation when ASN1_TYPE_cmp is passed a boolean type. This
      can be triggered during certificate verification so could be a DoS attack
      against a client or a server enabling client authentication.
      
      CVE-2015-0286
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      02758836
  2. 18 Mar, 2015 1 commit
  3. 12 Mar, 2015 1 commit
  4. 11 Mar, 2015 1 commit
  5. 09 Mar, 2015 1 commit
  6. 08 Mar, 2015 3 commits
  7. 07 Mar, 2015 1 commit
  8. 06 Mar, 2015 1 commit
  9. 02 Mar, 2015 2 commits
  10. 25 Feb, 2015 1 commit
  11. 24 Feb, 2015 1 commit
  12. 09 Feb, 2015 2 commits
  13. 06 Feb, 2015 1 commit
  14. 05 Feb, 2015 1 commit
  15. 04 Feb, 2015 1 commit
  16. 03 Feb, 2015 1 commit
  17. 22 Jan, 2015 17 commits