| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
| |
(CVE-2014-3513,CVE-2014-3567,CVE-2014-3568)
fixes #3434
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2014-3508 Information leak in pretty printing functions
CVE-2014-5139 Crash with SRP ciphersuite in Server Hello message
CVE-2014-3509 Race condition in ssl_parse_serverhello_tlsext
CVE-2014-3505 Double Free when processing DTLS packets
CVE-2014-3506 DTLS memory exhaustion
CVE-2014-3507 DTLS memory leak from zero-length fragments
CVE-2014-3510 OpenSSL DTLS anonymous EC(DH) denial of service
CVE-2014-3511 OpenSSL TLS protocol downgrade attack
CVE-2014-3512 SRP buffer overrun
(cherry picked from commit a662e7dfb065b0b91ca19c33838295bf3e459f48)
Conflicts:
main/openssl/APKBUILD
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Newly fixed CVEs:
CVE-2014-0224 SSL/TLS MITM vulnerability
CVE-2014-0221 DTLS recursion flaw
CVE-2014-0195 DTLS invalid fragment vulnerability
Previously fixed in Alpine by cherry picks:
CVE-2014-0198 SSL_MODE_RELEASE_BUFFERS NULL pointer dereference
(cherry picked from commit 120a0ce7ae2b324c46ba9e47fb64feaa13913582)
Conflicts:
main/openssl/APKBUILD
fixes #2996
|
|
|
|
| |
fixes #2917
|
|
|
|
|
|
| |
fixes #2896
(cherry picked from commit 4456c9ec91d13627b3900075f8ac84ce97551679)
|
|
|
|
|
| |
- fix for CVE-2014-0160
- fix for CVE-2014-0076
|
|
|
|
|
|
| |
(CVE-2013-4353,CVE-2013-6449,CVE-2013-6450)
fixes #2583
|
|
|
|
|
|
|
|
|
|
| |
As security measure, do not rely solely on hardware random source.
fixes #2510
(cherry picked from commit 1fd915b81678c58d35bf63761c260efd5362a93d)
Conflicts:
main/openssl/APKBUILD
|
| |
|
|
|
|
|
|
|
|
| |
http://marc.info/?t=136018837600003&r=1&w=2
(cherry picked from commit 24db490f2be6cab64aba36142309daf3fb624d34)
Conflicts:
main/openssl/APKBUILD
|
|
|
|
|
|
| |
(CVE-2013-0169,CVE-2012-2686,CVE-2013-0166)
fixes #1592
|
| |
|
|
|
|
|
| |
* fixed hmac oneshot flag to work as expected
* renamed the patch series, and rebased against 1.0.1c
|
|
|
|
|
|
| |
We want to handle bytes upto next block boundary, to work with
hardware from block boundary. The code incorrectly fed just the
amount of bytes in the block.
|
|
|
|
|
| |
fixes #1151
(cherry picked from commit 1831053bb87f432f0d45ccd9f7a368fc885a1d64)
|
| |
|
|
|
|
| |
fixes #1107
|
|
|
|
|
|
|
| |
Remove the unneeded 0002-apps-speed-fix; the speed utility can now
measure evp speeds with -evp flag.
Padlock autoloading patch is rebased.
|
| |
|
|
|
|
| |
fixes #935
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2011-4108
CVE-2011-4109
CVE-2011-4576
CVE-2011-4577
CVE-2011-4619
CVE-2012-0027
fixes #893
|
| |
|
|
|
|
| |
* contains security fix to CVE-2011-0014
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
- Fix for security issue CVE-2010-4180
- Fix for CVE-2010-4252
- Fix mishandling of absent EC point format extension.
- Fix various platform compilation issues.
- Corrected fix for security issue CVE-2010-3864.
|
|
|
|
| |
so we avoid /usr/lib64 on x86_64
|
|
|
|
|
|
| |
* upgrade to 1.0.0b which has security fixes
* update patch which did not apply anymore
* delete patch merged upstream
|
| |
|
| |
|
|
|
|
| |
The new feature is support for VIA Nano Padlock in 64-bit mode.
|
|\
| |
| |
| |
| | |
Conflicts:
main/openssl/APKBUILD
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Add new version of padlock patches which enable:
- limited support of VIA C7 SHA acceleration
- full support for VIA Nano SHA acceleration
Openssl HMAC core is also patched to take full performance out of
padlock. Speed application is updated for measuring hmac(sha1).
Padlock was moved to be dynamic engine in openssl-1.0.0. So add some
code that losfd automatically that engine.
|
| | |
|
| | |
|
|/ |
|
|
|
|
| |
and introduce libssl1.0 and libcrypto1.0 packages
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
* CVE-2009-1377
* CVE-2009-1378
* CVE-2009-1379
* CVE-2009-1387
* CVE-2009-2409
* CVE-2009-3555
|
| |
|
|
|
|
| |
gives about 2x performance improvement on sse enabled chips.
|
| |
|
|
|
|
|
|
|
| |
fix copying of oneshot sha1 context. also decrease the size
of "small buffer", to make context smaller (and context copy
faster in most cases); it should be still enough to catch
most hmac operations.
|
| |
|
|
|
|
|
|
|
|
| |
there was a bug sha context copying, that caused all hmac users
(and possibly others) to crash. also implemented a third
intermediate hashing mode with small buffer: it'll speed up
hashing in most cases considerably (packets / certificates to
be hashed are not usually too long).
|
|
added maintainer to several packages as well
|