- 07 8月, 2014 12 次提交
-
-
由 Dr. Stephen Henson 提交于
Check SRP parameters when they are received so we can send back an appropriate alert. Reviewed-by: NKurt Roeckx <kurt@openssl.org>
-
由 Dr. Stephen Henson 提交于
If a client attempted to use an SRP ciphersuite and it had not been set up correctly it would crash with a null pointer read. A malicious server could exploit this in a DoS attack. Thanks to Joonas Kuorilehto and Riku Hietamäki from Codenomicon for reporting this issue. CVE-2014-2970 Reviewed-by: NTim Hudson <tjh@openssl.org>
-
由 Gabor Tyukasz 提交于
CVE-2014-3509 Reviewed-by: NTim Hudson <tjh@openssl.org> Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
-
由 Emilia Käsper 提交于
CVE-2014-3510 Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
-
由 David Benjamin 提交于
CVE-2014-3511 Reviewed-by: NEmilia Käsper <emilia@openssl.org> Reviewed-by: NBodo Möller <bodo@openssl.org>
-
由 Adam Langley 提交于
In a couple of functions, a sequence number would be calculated twice. Additionally, in |dtls1_process_out_of_seq_message|, we know that |frag_len| <= |msg_hdr->msg_len| so the later tests for |frag_len < msg_hdr->msg_len| can be more clearly written as |frag_len != msg_hdr->msg_len|, since that's the only remaining case. Reviewed-by: NMatt Caswell <matt@openssl.org> Reviewed-by: NEmilia Käsper <emilia@openssl.org>
-
由 Matt Caswell 提交于
Applying same fix as in dtls1_process_out_of_seq_message. A truncated DTLS fragment would cause *ok to be clear, but the return value would still be the number of bytes read. Problem identified by Emilia Käsper, based on previous issue/patch by Adam Langley. Reviewed-by: NEmilia Käsper <emilia@openssl.org>
-
由 Adam Langley 提交于
Previously, a truncated DTLS fragment in |dtls1_process_out_of_seq_message| would cause *ok to be cleared, but the return value would still be the number of bytes read. This would cause |dtls1_get_message| not to consider it an error and it would continue processing as normal until the calling function noticed that *ok was zero. I can't see an exploit here because |dtls1_get_message| uses |s->init_num| as the length, which will always be zero from what I can see. Reviewed-by: NMatt Caswell <matt@openssl.org> Reviewed-by: NEmilia Käsper <emilia@openssl.org>
-
由 Adam Langley 提交于
The |pqueue_insert| function can fail if one attempts to insert a duplicate sequence number. When handling a fragment of an out of sequence message, |dtls1_process_out_of_seq_message| would not call |dtls1_reassemble_fragment| if the fragment's length was zero. It would then allocate a fresh fragment and attempt to insert it, but ignore the return value, leaking the fragment. This allows an attacker to exhaust the memory of a DTLS peer. Fixes CVE-2014-3507 Reviewed-by: NMatt Caswell <matt@openssl.org> Reviewed-by: NEmilia Käsper <emilia@openssl.org>
-
由 Matt Caswell 提交于
In |dtls1_reassemble_fragment|, the value of |msg_hdr->frag_off+frag_len| was being checked against the maximum handshake message size, but then |msg_len| bytes were allocated for the fragment buffer. This means that so long as the fragment was within the allowed size, the pending handshake message could consume 16MB + 2MB (for the reassembly bitmap). Approx 10 outstanding handshake messages are allowed, meaning that an attacker could consume ~180MB per DTLS connection. In the non-fragmented path (in |dtls1_process_out_of_seq_message|), no check was applied. Fixes CVE-2014-3506 Wholly based on patch by Adam Langley with one minor amendment. Reviewed-by: NEmilia Käsper <emilia@openssl.org>
-
由 Matt Caswell 提交于
Reviewed-by: NEmilia Käsper <emilia@openssl.org>
-
由 Adam Langley 提交于
The |item| variable, in both of these cases, may contain a pointer to a |pitem| structure within |s->d1->buffered_messages|. It was being freed in the error case while still being in |buffered_messages|. When the error later caused the |SSL*| to be destroyed, the item would be double freed. Thanks to Wah-Teh Chang for spotting that the fix in 1632ef74 was inconsistent with the other error paths (but correct). Fixes CVE-2014-3505 Reviewed-by: NMatt Caswell <matt@openssl.org> Reviewed-by: NEmilia Käsper <emilia@openssl.org>
-
- 25 7月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Don't call internal functions directly call them through SSL_test_functions(). This also makes unit testing work on Windows and platforms that don't export internal functions from shared libraries. By default unit testing is not enabled: it requires the compile time option "enable-unit-test". Reviewed-by: NGeoff Thorpe <geoff@openssl.org>
-
- 20 7月, 2014 2 次提交
-
-
由 Mike Bland 提交于
ssl/ssl_locl.h now comes first to ensure that it will compile standalone. test/testutil.h is considered to be in the same directory as the test file, since the test file will be linked into test/ and built there. Reviewed-by: NTim Hudson <tjh@openssl.org>
-
由 Mike Bland 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 16 7月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Use same logic when determining when to expect a client certificate for both TLS and DTLS. PR#3452
-
- 15 7月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 14 7月, 2014 1 次提交
-
-
由 Peter Mosmans 提交于
PR#3440
-
- 09 7月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
PR: #3424,#3423,#3422
-
- 06 7月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 05 7月, 2014 2 次提交
-
-
由 Ben Laurie 提交于
-
由 Dr. Stephen Henson 提交于
PR#319 (reoponed version).
-
- 04 7月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Remove RFC5878 code. It is no longer needed for CT and has numerous bugs
-
- 02 7月, 2014 5 次提交
-
-
由 Thijs Alkemade 提交于
-
由 Ben Laurie 提交于
(cherry picked from commit 2db3ea29298bdc347f15fbfab6d5746022f05101) Conflicts: ssl/t1_lib.c
-
由 Rich Salz 提交于
-
由 Rich Salz 提交于
-
由 Rich Salz 提交于
-
- 01 7月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
(cherry picked from commit c97ec5631bb08a2171a125008d2f0d2a75687aaa)
-
- 30 6月, 2014 3 次提交
-
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-
- 29 6月, 2014 1 次提交
-
-
由 Dr. Stephen Henson 提交于
PR#2531
-
- 28 6月, 2014 4 次提交
-
-
由 Dr. Stephen Henson 提交于
Some state strings were erronously not compiled when no-ssl2 was set. PR#3295
-
由 yogesh nagarkar 提交于
PR#3141
-
由 Ken Ballou 提交于
PR#3174
-
由 PK 提交于
PR#2800
-
- 27 6月, 2014 1 次提交
-
-
由 Tomas Mraz 提交于
PR#3374
-
- 23 6月, 2014 2 次提交
-
-
由 Miod Vallat 提交于
In the ssl_cipher_get_evp() function, fix off-by-one errors in index validation before accessing arrays. Bug discovered and fixed by Miod Vallat from the OpenBSD team. PR#3375
-
由 Matt Caswell 提交于
This reverts commit abfb989f. Incorrect attribution
-