Skip to content
  1. Jun 12, 2014
  2. Jun 10, 2014
  3. Jun 09, 2014
  4. Jun 06, 2014
  5. Jun 05, 2014
  6. Jun 03, 2014
    • Dr. Stephen Henson's avatar
      Fix CVE-2014-3470 · 141a5482
      Dr. Stephen Henson authored
      Check session_cert is not NULL before dereferencing it.
      141a5482
    • Dr. Stephen Henson's avatar
      Fix CVE-2014-0221 · de2422af
      Dr. Stephen Henson authored
      Unnecessary recursion when receiving a DTLS hello request can be used to
      crash a DTLS client. Fixed by handling DTLS hello request without recursion.
      
      Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue.
      de2422af
    • Dr. Stephen Henson's avatar
      Additional CVE-2014-0224 protection. · 897169fd
      Dr. Stephen Henson authored
      Return a fatal error if an attempt is made to use a zero length
      master secret.
      897169fd
    • Dr. Stephen Henson's avatar
      Fix for CVE-2014-0224 · 410a49a4
      Dr. Stephen Henson authored
      Only accept change cipher spec when it is expected instead of at any
      time. This prevents premature setting of session keys before the master
      secret is determined which an attacker could use as a MITM attack.
      
      Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue
      and providing the initial fix this patch is based on.
      410a49a4
    • Dr. Stephen Henson's avatar
      Fix for CVE-2014-0195 · 82ba68c4
      Dr. Stephen Henson authored
      A buffer overrun attack can be triggered by sending invalid DTLS fragments
      to an OpenSSL DTLS client or server. This is potentially exploitable to
      run arbitrary code on a vulnerable client or server.
      
      Fixed by adding consistency check for DTLS fragments.
      
      Thanks to Jüri Aedla for reporting this issue.
      82ba68c4
  7. Jun 02, 2014
  8. Jun 01, 2014
  9. May 29, 2014
  10. May 27, 2014
  11. May 25, 2014
  12. May 24, 2014
  13. May 21, 2014
  14. May 15, 2014
  15. May 14, 2014
  16. May 12, 2014
  17. May 11, 2014
  18. May 08, 2014
    • Dr. Stephen Henson's avatar
      Return an error if no recipient type matches. · 70ddf8ec
      Dr. Stephen Henson authored
      If the key type does not match any CMS recipient type return
      an error instead of using a random key (MMA mitigation). This
      does not leak any useful information to an attacker.
      
      PR#3348
      (cherry picked from commit 83a3182e0560f76548f4378325393461f6275493)
      70ddf8ec
  19. May 06, 2014
    • Geoff Thorpe's avatar
      evp: prevent underflow in base64 decoding · 9febee02
      Geoff Thorpe authored
      
      
      This patch resolves RT ticket #2608.
      
      Thanks to Robert Dugal for originally spotting this, and to David
      Ramos for noticing that the ball had been dropped.
      
      Signed-off-by: default avatarGeoff Thorpe <geoff@openssl.org>
      9febee02
    • Geoff Thorpe's avatar
      bignum: allow concurrent BN_MONT_CTX_set_locked() · a721216f
      Geoff Thorpe authored
      
      
      The lazy-initialisation of BN_MONT_CTX was serialising all threads, as
      noted by Daniel Sands and co at Sandia. This was to handle the case that
      2 or more threads race to lazy-init the same context, but stunted all
      scalability in the case where 2 or more threads are doing unrelated
      things! We favour the latter case by punishing the former. The init work
      gets done by each thread that finds the context to be uninitialised, and
      we then lock the "set" logic after that work is done - the winning
      thread's work gets used, the losing threads throw away what they've done.
      
      Signed-off-by: default avatarGeoff Thorpe <geoff@openssl.org>
      a721216f