Skip to content
  1. Mar 19, 2015
    • Matt Caswell's avatar
      Remove overlapping CHANGES/NEWS entries · 82123b5e
      Matt Caswell authored
      
      
      Remove entries from CHANGES and NEWS from letter releases that occur *after*
      the next point release. Without this we get duplicate entries for the same
      issue appearing multiple times.
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      82123b5e
    • Emilia Kasper's avatar
      Fix reachable assert in SSLv2 servers. · cd56a08d
      Emilia Kasper authored
      
      
      This assert is reachable for servers that support SSLv2 and export ciphers.
      Therefore, such servers can be DoSed by sending a specially crafted
      SSLv2 CLIENT-MASTER-KEY.
      
      Also fix s2_srvr.c to error out early if the key lengths are malformed.
      These lengths are sent unencrypted, so this does not introduce an oracle.
      
      CVE-2015-0293
      
      This issue was discovered by Sean Burford (Google) and Emilia Käsper of
      the OpenSSL development team.
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      Reviewed-by: default avatarTim Hudson <tjh@openssl.org>
      cd56a08d
    • Emilia Kasper's avatar
      PKCS#7: avoid NULL pointer dereferences with missing content · e2acb69c
      Emilia Kasper authored
      
      
      In PKCS#7, the ASN.1 content component is optional.
      This typically applies to inner content (detached signatures),
      however we must also handle unexpected missing outer content
      correctly.
      
      This patch only addresses functions reachable from parsing,
      decryption and verification, and functions otherwise associated
      with reading potentially untrusted data.
      
      Correcting all low-level API calls requires further work.
      
      CVE-2015-0289
      
      Thanks to Michal Zalewski (Google) for reporting this issue.
      
      Reviewed-by: default avatarSteve Henson <steve@openssl.org>
      e2acb69c
    • Dr. Stephen Henson's avatar
      Fix ASN1_TYPE_cmp · c982285a
      Dr. Stephen Henson authored
      
      
      Fix segmentation violation when ASN1_TYPE_cmp is passed a boolean type. This
      can be triggered during certificate verification so could be a DoS attack
      against a client or a server enabling client authentication.
      
      CVE-2015-0286
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      c982285a
  2. Mar 18, 2015
  3. Mar 17, 2015
  4. Mar 14, 2015
  5. Mar 12, 2015
  6. Mar 11, 2015
  7. Mar 10, 2015
  8. Mar 09, 2015
  9. Mar 08, 2015
  10. Mar 07, 2015
  11. Mar 06, 2015
  12. Mar 05, 2015
  13. Mar 02, 2015
  14. Feb 27, 2015