Skip to content
  1. Jun 16, 2014
  2. Jun 14, 2014
  3. Jun 13, 2014
  4. Jun 12, 2014
  5. Jun 11, 2014
  6. Jun 10, 2014
  7. Jun 09, 2014
  8. Jun 08, 2014
  9. Jun 07, 2014
  10. Jun 06, 2014
  11. Jun 05, 2014
    • Dr. Stephen Henson's avatar
      Update value to use a free bit. · 5111672b
      Dr. Stephen Henson authored
      5111672b
    • Dr. Stephen Henson's avatar
      Fix for CVE-2014-0195 · 410e444b
      Dr. Stephen Henson authored
      A buffer overrun attack can be triggered by sending invalid DTLS fragments
      to an OpenSSL DTLS client or server. This is potentially exploitable to
      run arbitrary code on a vulnerable client or server.
      
      Fixed by adding consistency check for DTLS fragments.
      
      Thanks to Jüri Aedla for reporting this issue.
      (cherry picked from commit 1632ef744872edc2aa2a53d487d3e79c965a4ad3)
      410e444b
    • Dr. Stephen Henson's avatar
      Fix for CVE-2014-0224 · a91be108
      Dr. Stephen Henson authored
      Only accept change cipher spec when it is expected instead of at any
      time. This prevents premature setting of session keys before the master
      secret is determined which an attacker could use as a MITM attack.
      
      Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue
      and providing the initial fix this patch is based on.
      (cherry picked from commit bc8923b1)
      a91be108
    • Dr. Stephen Henson's avatar
      Additional CVE-2014-0224 protection. · a7c682fb
      Dr. Stephen Henson authored
      Return a fatal error if an attempt is made to use a zero length
      master secret.
      (cherry picked from commit 006cd7083f76ed5cb0d9a914857e9231ef1bc317)
      a7c682fb