1. 03 Jul, 2014 5 commits
  2. 02 Jul, 2014 3 commits
    • Matt Smart's avatar
      Fix doc typo. · d7080d62
      Matt Smart authored
      ERR_get_error(3) references the non-existent
      ERR_get_last_error_line_data instead of the one that does exist,
      ERR_peek_last_error_line_data.
      
      PR#3283
      (cherry picked from commit 5cc99c6c)
      d7080d62
    • Geoff Thorpe's avatar
      util/mkerr.pl: fix perl warning · 5d7c8a48
      Geoff Thorpe authored
      
      
      Gets rid of this;
      
      defined(@array) is deprecated at ../util/mkerr.pl line 792.
              (Maybe you should just omit the defined()?)
      defined(@array) is deprecated at ../util/mkerr.pl line 800.
              (Maybe you should just omit the defined()?)
      
      Signed-off-by: default avatarGeoff Thorpe <geoff@openssl.org>
      (cherry picked from commit 647f360e)
      5d7c8a48
    • Dr. Stephen Henson's avatar
      ASN1 sanity check. · 00e86a74
      Dr. Stephen Henson authored
      Primitive encodings shouldn't use indefinite length constructed
      form.
      
      PR#2438 (partial).
      (cherry picked from commit 398e99fe)
      00e86a74
  3. 29 Jun, 2014 3 commits
  4. 28 Jun, 2014 1 commit
  5. 27 Jun, 2014 8 commits
  6. 26 Jun, 2014 1 commit
  7. 22 Jun, 2014 2 commits
  8. 14 Jun, 2014 1 commit
    • Dr. Stephen Henson's avatar
      Accept CCS after sending finished. · 70d923fb
      Dr. Stephen Henson authored
      Allow CCS after finished has been sent by client: at this point
      keys have been correctly set up so it is OK to accept CCS from
      server. Without this renegotiation can sometimes fail.
      
      PR#3400
      (cherry picked from commit 99cd6a91fcb0931feaebbb4832681d40a66fad41)
      70d923fb
  9. 12 Jun, 2014 2 commits
  10. 10 Jun, 2014 1 commit
  11. 09 Jun, 2014 1 commit
  12. 06 Jun, 2014 3 commits
  13. 05 Jun, 2014 4 commits
  14. 03 Jun, 2014 5 commits
    • Dr. Stephen Henson's avatar
      Fix CVE-2014-3470 · 141a5482
      Dr. Stephen Henson authored
      Check session_cert is not NULL before dereferencing it.
      141a5482
    • Dr. Stephen Henson's avatar
      Fix CVE-2014-0221 · de2422af
      Dr. Stephen Henson authored
      Unnecessary recursion when receiving a DTLS hello request can be used to
      crash a DTLS client. Fixed by handling DTLS hello request without recursion.
      
      Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue.
      de2422af
    • Dr. Stephen Henson's avatar
      Additional CVE-2014-0224 protection. · 897169fd
      Dr. Stephen Henson authored
      Return a fatal error if an attempt is made to use a zero length
      master secret.
      897169fd
    • Dr. Stephen Henson's avatar
      Fix for CVE-2014-0224 · 410a49a4
      Dr. Stephen Henson authored
      Only accept change cipher spec when it is expected instead of at any
      time. This prevents premature setting of session keys before the master
      secret is determined which an attacker could use as a MITM attack.
      
      Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue
      and providing the initial fix this patch is based on.
      410a49a4
    • Dr. Stephen Henson's avatar
      Fix for CVE-2014-0195 · 82ba68c4
      Dr. Stephen Henson authored
      A buffer overrun attack can be triggered by sending invalid DTLS fragments
      to an OpenSSL DTLS client or server. This is potentially exploitable to
      run arbitrary code on a vulnerable client or server.
      
      Fixed by adding consistency check for DTLS fragments.
      
      Thanks to Jüri Aedla for reporting this issue.
      82ba68c4