1. 05 6月, 2014 4 次提交
    • D
      Fix for CVE-2014-0224 · a91be108
      Dr. Stephen Henson 提交于
      Only accept change cipher spec when it is expected instead of at any
      time. This prevents premature setting of session keys before the master
      secret is determined which an attacker could use as a MITM attack.
      
      Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for reporting this issue
      and providing the initial fix this patch is based on.
      (cherry picked from commit bc8923b1ec9c467755cd86f7848c50ee8812e441)
      a91be108
    • D
      Additional CVE-2014-0224 protection. · a7c682fb
      Dr. Stephen Henson 提交于
      Return a fatal error if an attempt is made to use a zero length
      master secret.
      (cherry picked from commit 006cd7083f76ed5cb0d9a914857e9231ef1bc317)
      a7c682fb
    • D
      Fix CVE-2014-0221 · b4322e1d
      Dr. Stephen Henson 提交于
      Unnecessary recursion when receiving a DTLS hello request can be used to
      crash a DTLS client. Fixed by handling DTLS hello request without recursion.
      
      Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue.
      (cherry picked from commit d3152655d5319ce883c8e3ac4b99f8de4c59d846)
      b4322e1d
    • D
      Fix CVE-2014-3470 · a5362db4
      Dr. Stephen Henson 提交于
      Check session_cert is not NULL before dereferencing it.
      (cherry picked from commit 8011cd56e39a433b1837465259a9bd24a38727fb)
      a5362db4
  2. 03 6月, 2014 2 次提交
  3. 02 6月, 2014 4 次提交
  4. 01 6月, 2014 1 次提交
  5. 31 5月, 2014 2 次提交
  6. 26 5月, 2014 1 次提交
  7. 25 5月, 2014 1 次提交
  8. 24 5月, 2014 1 次提交
  9. 23 5月, 2014 1 次提交
  10. 20 5月, 2014 8 次提交
  11. 13 5月, 2014 2 次提交
  12. 12 5月, 2014 2 次提交
  13. 11 5月, 2014 2 次提交
  14. 08 5月, 2014 1 次提交
  15. 01 5月, 2014 1 次提交
  16. 26 4月, 2014 1 次提交
  17. 23 4月, 2014 1 次提交
  18. 21 4月, 2014 1 次提交
  19. 08 4月, 2014 1 次提交
    • D
      Add heartbeat extension bounds check. · 731f4314
      Dr. Stephen Henson 提交于
      A missing bounds check in the handling of the TLS heartbeat extension
      can be used to reveal up to 64k of memory to a connected client or
      server.
      
      Thanks for Neel Mehta of Google Security for discovering this bug and to
      Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for
      preparing the fix (CVE-2014-0160)
      (cherry picked from commit 96db9023b881d7cd9f379b0c154650d6c108e9a3)
      731f4314
  20. 06 4月, 2014 1 次提交
  21. 05 4月, 2014 1 次提交
  22. 28 3月, 2014 1 次提交