Skip to content
  1. Jun 03, 2014
    • Dr. Stephen Henson's avatar
      Fix for CVE-2014-0195 · 82ba68c4
      Dr. Stephen Henson authored
      A buffer overrun attack can be triggered by sending invalid DTLS fragments
      to an OpenSSL DTLS client or server. This is potentially exploitable to
      run arbitrary code on a vulnerable client or server.
      
      Fixed by adding consistency check for DTLS fragments.
      
      Thanks to Jüri Aedla for reporting this issue.
      82ba68c4
  2. Jun 02, 2014
  3. Jun 01, 2014
  4. May 29, 2014
  5. May 27, 2014
  6. May 25, 2014
  7. May 24, 2014
  8. May 21, 2014
  9. May 15, 2014
  10. May 14, 2014
  11. May 12, 2014
  12. May 11, 2014
  13. May 08, 2014
    • Dr. Stephen Henson's avatar
      Return an error if no recipient type matches. · 70ddf8ec
      Dr. Stephen Henson authored
      If the key type does not match any CMS recipient type return
      an error instead of using a random key (MMA mitigation). This
      does not leak any useful information to an attacker.
      
      PR#3348
      (cherry picked from commit 83a3182e0560f76548f4378325393461f6275493)
      70ddf8ec
  14. May 06, 2014
  15. Apr 24, 2014
  16. Apr 11, 2014
  17. Apr 09, 2014
  18. Apr 04, 2014
  19. Apr 02, 2014
    • Eric Young's avatar
      Fix base64 decoding bug. · 9ad5c5e4
      Eric Young authored
      A short PEM encoded sequence if passed to the BIO, and the file
      had 2 \n following would fail.
      
      PR#3289
      (cherry picked from commit 10378fb5)
      9ad5c5e4
  20. Mar 27, 2014
  21. Feb 15, 2014
  22. Jan 29, 2014
    • Dr. Stephen Henson's avatar
      Clarify docs. · 2fb8642e
      Dr. Stephen Henson authored
      Remove reference to ERR_TXT_MALLOCED in the error library as that is
      only used internally. Indicate that returned error data must not be
      freed.
      (cherry picked from commit f2d678e6)
      2fb8642e