Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
04fac373
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
10
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
04fac373
编写于
10月 19, 2005
作者:
M
Mark J. Cox
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
one time CAN->CVE update
上级
bcb43bb3
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
16 addition
and
16 deletion
+16
-16
CHANGES
CHANGES
+16
-16
未找到文件。
CHANGES
浏览文件 @
04fac373
...
@@ -51,7 +51,7 @@
...
@@ -51,7 +51,7 @@
(part of SSL_OP_ALL). This option used to disable the
(part of SSL_OP_ALL). This option used to disable the
countermeasure against man-in-the-middle protocol-version
countermeasure against man-in-the-middle protocol-version
rollback in the SSL 2.0 server implementation, which is a bad
rollback in the SSL 2.0 server implementation, which is a bad
idea. (C
AN
-2005-2969)
idea. (C
VE
-2005-2969)
[Bodo Moeller; problem pointed out by Yutaka Oiwa (Research Center
[Bodo Moeller; problem pointed out by Yutaka Oiwa (Research Center
for Information Security, National Institute of Advanced Industrial
for Information Security, National Institute of Advanced Industrial
...
@@ -916,7 +916,7 @@
...
@@ -916,7 +916,7 @@
(part of SSL_OP_ALL). This option used to disable the
(part of SSL_OP_ALL). This option used to disable the
countermeasure against man-in-the-middle protocol-version
countermeasure against man-in-the-middle protocol-version
rollback in the SSL 2.0 server implementation, which is a bad
rollback in the SSL 2.0 server implementation, which is a bad
idea. (C
AN
-2005-2969)
idea. (C
VE
-2005-2969)
[Bodo Moeller; problem pointed out by Yutaka Oiwa (Research Center
[Bodo Moeller; problem pointed out by Yutaka Oiwa (Research Center
for Information Security, National Institute of Advanced Industrial
for Information Security, National Institute of Advanced Industrial
...
@@ -1078,11 +1078,11 @@
...
@@ -1078,11 +1078,11 @@
Changes between 0.9.7c and 0.9.7d [17 Mar 2004]
Changes between 0.9.7c and 0.9.7d [17 Mar 2004]
*) Fix null-pointer assignment in do_change_cipher_spec() revealed
*) Fix null-pointer assignment in do_change_cipher_spec() revealed
by using the Codenomicon TLS Test Tool (C
AN
-2004-0079)
by using the Codenomicon TLS Test Tool (C
VE
-2004-0079)
[Joe Orton, Steve Henson]
[Joe Orton, Steve Henson]
*) Fix flaw in SSL/TLS handshaking when using Kerberos ciphersuites
*) Fix flaw in SSL/TLS handshaking when using Kerberos ciphersuites
(C
AN
-2004-0112)
(C
VE
-2004-0112)
[Joe Orton, Steve Henson]
[Joe Orton, Steve Henson]
*) Make it possible to have multiple active certificates with the same
*) Make it possible to have multiple active certificates with the same
...
@@ -1125,9 +1125,9 @@
...
@@ -1125,9 +1125,9 @@
*) Fix various bugs revealed by running the NISCC test suite:
*) Fix various bugs revealed by running the NISCC test suite:
Stop out of bounds reads in the ASN1 code when presented with
Stop out of bounds reads in the ASN1 code when presented with
invalid tags (C
AN-2003-0543 and CAN
-2003-0544).
invalid tags (C
VE-2003-0543 and CVE
-2003-0544).
Free up ASN1_TYPE correctly if ANY type is invalid (C
AN
-2003-0545).
Free up ASN1_TYPE correctly if ANY type is invalid (C
VE
-2003-0545).
If verify callback ignores invalid public key errors don't try to check
If verify callback ignores invalid public key errors don't try to check
certificate signature with the NULL public key.
certificate signature with the NULL public key.
...
@@ -1212,7 +1212,7 @@
...
@@ -1212,7 +1212,7 @@
via timing by performing a MAC computation even if incorrrect
via timing by performing a MAC computation even if incorrrect
block cipher padding has been found. This is a countermeasure
block cipher padding has been found. This is a countermeasure
against active attacks where the attacker has to distinguish
against active attacks where the attacker has to distinguish
between bad padding and a MAC verification error. (C
AN
-2003-0078)
between bad padding and a MAC verification error. (C
VE
-2003-0078)
[Bodo Moeller; problem pointed out by Brice Canvel (EPFL),
[Bodo Moeller; problem pointed out by Brice Canvel (EPFL),
Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and
Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and
...
@@ -1429,7 +1429,7 @@
...
@@ -1429,7 +1429,7 @@
Remote buffer overflow in SSL3 protocol - an attacker could
Remote buffer overflow in SSL3 protocol - an attacker could
supply an oversized master key in Kerberos-enabled versions.
supply an oversized master key in Kerberos-enabled versions.
(C
AN
-2002-0657)
(C
VE
-2002-0657)
[Ben Laurie (CHATS)]
[Ben Laurie (CHATS)]
*) Change the SSL kerb5 codes to match RFC 2712.
*) Change the SSL kerb5 codes to match RFC 2712.
...
@@ -3113,7 +3113,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
...
@@ -3113,7 +3113,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
Changes between 0.9.6l and 0.9.6m [17 Mar 2004]
Changes between 0.9.6l and 0.9.6m [17 Mar 2004]
*) Fix null-pointer assignment in do_change_cipher_spec() revealed
*) Fix null-pointer assignment in do_change_cipher_spec() revealed
by using the Codenomicon TLS Test Tool (C
AN
-2004-0079)
by using the Codenomicon TLS Test Tool (C
VE
-2004-0079)
[Joe Orton, Steve Henson]
[Joe Orton, Steve Henson]
Changes between 0.9.6k and 0.9.6l [04 Nov 2003]
Changes between 0.9.6k and 0.9.6l [04 Nov 2003]
...
@@ -3121,7 +3121,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
...
@@ -3121,7 +3121,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
*) Fix additional bug revealed by the NISCC test suite:
*) Fix additional bug revealed by the NISCC test suite:
Stop bug triggering large recursion when presented with
Stop bug triggering large recursion when presented with
certain ASN.1 tags (C
AN
-2003-0851)
certain ASN.1 tags (C
VE
-2003-0851)
[Steve Henson]
[Steve Henson]
Changes between 0.9.6j and 0.9.6k [30 Sep 2003]
Changes between 0.9.6j and 0.9.6k [30 Sep 2003]
...
@@ -3129,7 +3129,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
...
@@ -3129,7 +3129,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
*) Fix various bugs revealed by running the NISCC test suite:
*) Fix various bugs revealed by running the NISCC test suite:
Stop out of bounds reads in the ASN1 code when presented with
Stop out of bounds reads in the ASN1 code when presented with
invalid tags (C
AN-2003-0543 and CAN
-2003-0544).
invalid tags (C
VE-2003-0543 and CVE
-2003-0544).
If verify callback ignores invalid public key errors don't try to check
If verify callback ignores invalid public key errors don't try to check
certificate signature with the NULL public key.
certificate signature with the NULL public key.
...
@@ -3181,7 +3181,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
...
@@ -3181,7 +3181,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
via timing by performing a MAC computation even if incorrrect
via timing by performing a MAC computation even if incorrrect
block cipher padding has been found. This is a countermeasure
block cipher padding has been found. This is a countermeasure
against active attacks where the attacker has to distinguish
against active attacks where the attacker has to distinguish
between bad padding and a MAC verification error. (C
AN
-2003-0078)
between bad padding and a MAC verification error. (C
VE
-2003-0078)
[Bodo Moeller; problem pointed out by Brice Canvel (EPFL),
[Bodo Moeller; problem pointed out by Brice Canvel (EPFL),
Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and
Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and
...
@@ -3314,7 +3314,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
...
@@ -3314,7 +3314,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
*) Add various sanity checks to asn1_get_length() to reject
*) Add various sanity checks to asn1_get_length() to reject
the ASN1 length bytes if they exceed sizeof(long), will appear
the ASN1 length bytes if they exceed sizeof(long), will appear
negative or the content length exceeds the length of the
negative or the content length exceeds the length of the
supplied buffer. (C
AN
-2002-0659)
supplied buffer. (C
VE
-2002-0659)
[Steve Henson, Adi Stav <stav@mercury.co.il>, James Yonan <jim@ntlp.com>]
[Steve Henson, Adi Stav <stav@mercury.co.il>, James Yonan <jim@ntlp.com>]
*) Assertions for various potential buffer overflows, not known to
*) Assertions for various potential buffer overflows, not known to
...
@@ -3322,15 +3322,15 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
...
@@ -3322,15 +3322,15 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
[Ben Laurie (CHATS)]
[Ben Laurie (CHATS)]
*) Various temporary buffers to hold ASCII versions of integers were
*) Various temporary buffers to hold ASCII versions of integers were
too small for 64 bit platforms. (C
AN
-2002-0655)
too small for 64 bit platforms. (C
VE
-2002-0655)
[Matthew Byng-Maddick <mbm@aldigital.co.uk> and Ben Laurie (CHATS)>
[Matthew Byng-Maddick <mbm@aldigital.co.uk> and Ben Laurie (CHATS)>
*) Remote buffer overflow in SSL3 protocol - an attacker could
*) Remote buffer overflow in SSL3 protocol - an attacker could
supply an oversized session ID to a client. (C
AN
-2002-0656)
supply an oversized session ID to a client. (C
VE
-2002-0656)
[Ben Laurie (CHATS)]
[Ben Laurie (CHATS)]
*) Remote buffer overflow in SSL2 protocol - an attacker could
*) Remote buffer overflow in SSL2 protocol - an attacker could
supply an oversized client master key. (C
AN
-2002-0656)
supply an oversized client master key. (C
VE
-2002-0656)
[Ben Laurie (CHATS)]
[Ben Laurie (CHATS)]
Changes between 0.9.6c and 0.9.6d [9 May 2002]
Changes between 0.9.6c and 0.9.6d [9 May 2002]
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录