| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
| |
CVE-2016-2107 Prevent padding oracle in AES-NI CBC MAC check
CVE-2016-2105 Fix EVP_EncodeUpdate overflow
CVE-2016-2106 Fix EVP_EncryptUpdate overflow
CVE-2016-2109 Prevent ASN.1 BIO excessive memory allocation
CVE-2016-2176 EBCDIC overread
fixes #5581
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-0800 [High severity]
CVE-2016-0705 [Low severity]
CVE-2016-0798 [Low severity]
CVE-2016-0797 [Low severity]
CVE-2016-0799 [Low severity]
CVE-2016-0702 [Low severity]
fixes #5210
|
|
|
|
|
|
| |
Fixes CVE-2015-3197
(cherry picked from commit 82dae76b434b656e0fe9d8dffff5037059d25559)
|
| |
|
|
|
|
| |
(cherry picked from commit 8330e10563fb27e1dc811c982b76c782fb096104)
|
|
|
|
| |
(cherry picked from commit 4ec73e4f66d25d92e336f1bf8e7ac80100a8b72c)
|
|
|
|
|
|
|
|
|
|
| |
CVE-2015-1788 Malformed ECParameters causes infinite loop
CVE-2015-1789 Exploitable out-of-bounds read in X509_cmp_time
CVE-2015-1790 PKCS7 crash with missing EnvelopedContent
CVE-2015-1792 CMS verify infinite loop with unknown hash function
CVE-2015-1791 Race condition handling NewSessionTicket
(cherry picked from commit 0c0f46aad82893010ebb45cd4e710b3ba9fc9af8)
|
|
|
|
|
|
|
|
| |
System wide mitigation for CVE-2012-4929. While most affected
programs turn off compression themselves, this is safer default.
(cherry picked from commit 5891af54e70fd91c02e6f8ab9b2059662b0ecfd4)
(cherry picked from commit ac5c4e2e3e9221c51dfc317c9a79f9b5f04cb694)
|
|
|
|
|
|
|
|
|
| |
CVE-2015-0286, CVE-2015-0287, CVE-2015-0289, CVE-2015-0293,
CVE-2015-0209, CVE-2015-0288
all patches refreshed
(cherry picked from commit fe6a6566db78dfcc252a6b38d6a54d9d1c1d6aa0)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
fixes #3685
CVE-2014-3571 DTLS segmentation fault in dtls1_get_record
CVE-2015-0206 DTLS memory leak in dtls1_buffer_record
CVE-2014-3569 no-ssl3 configuration sets method to NULL
CVE-2014-3572 ECDHE silently downgrades to ECDH [Client]
CVE-2015-0204 RSA silently downgrades to EXPORT_RSA [Client]
CVE-2015-0205 DH client certificates accepted without verification [Server]
CVE-2014-8275 Certificate fingerprints can be modified
CVE-2014-3570 Bignum squaring may produce incorrect results
(cherry picked from commit 26dd384585d2182a35bd9450091726b6472b3b24)
|
|
|
|
|
|
| |
(CVE-2014-3513,CVE-2014-3567,CVE-2014-3568)
fixes #3437
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2014-3508 Information leak in pretty printing functions
CVE-2014-5139 Crash with SRP ciphersuite in Server Hello message
CVE-2014-3509 Race condition in ssl_parse_serverhello_tlsext
CVE-2014-3505 Double Free when processing DTLS packets
CVE-2014-3506 DTLS memory exhaustion
CVE-2014-3507 DTLS memory leak from zero-length fragments
CVE-2014-3510 OpenSSL DTLS anonymous EC(DH) denial of service
CVE-2014-3511 OpenSSL TLS protocol downgrade attack
CVE-2014-3512 SRP buffer overrun
(cherry picked from commit 9b2d3aa0289fc6e6f5fddca823337631d49cadf5)
(cherry picked from commit d4f5d980c75fd5b13a60637aafa549f1407a85c8)
(cherry picked from commit 7c34cd9c948a7bd20f05a136eaa9bec33c479849)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Newly fixed CVEs:
CVE-2014-0224 SSL/TLS MITM vulnerability
CVE-2014-0221 DTLS recursion flaw
CVE-2014-0195 DTLS invalid fragment vulnerability
Previously fixed in Alpine by cherry picks:
CVE-2014-0198 SSL_MODE_RELEASE_BUFFERS NULL pointer dereference
(cherry picked from commit c7c8818b7203c5ff58dd5f7d03f7e47cb681348d)
fixes #2999
|
|
|
|
| |
ref #2916
|
|
|
|
| |
and it also happens with freebufs on multi-threaded programs.
|
|
|
|
|
|
|
| |
This code is dubious at best and also responsible for the heartbleed vulnerability
being exposed in the first place. With the heartbleed test on a broken version, this
results in a daemon crash instead of private key exposure. We add dummy padding to
preserve ABI compatibility with older packages.
|
|
|
|
|
| |
- fix for CVE-2014-0160
- fix for CVE-2014-0076
|
|
|
|
|
| |
fixes parallel build and linking to dynamic libcrypto of c_rehash in
case openssl-dev is not installed.
|
|
|
|
|
|
|
| |
* Don't include gmt_unix_time in TLS server and client random values
* Fix for TLS record tampering bug CVE-2013-4353
* Fix for TLS version checking bug CVE-2013-6449
* Fix for DTLS retransmission bug CVE-2013-6450
|
| |
|
|
|
|
| |
fixes #2533
|
| |
|
|
|
|
| |
As security measure, do not rely solely on hardware random source.
|
| |
|
|
|
|
|
|
| |
from http://cvs.pld-linux.org/cgi-bin/viewvc.cgi/cvs/packages/openssl/openssl-c_rehash.sh
ref #2266
|
| |
|
| |
|
|
|
|
| |
Apply patch from openssl rt.
|
|
|
|
|
|
|
|
|
| |
Add EVP_MD_FLAG_PKEY_METHOD_SIGNATURE to padlock_sha1_md to fix
DSA/SHA1 verification in certain cases. Seems that NID_sha1 instead
of NID_dss is used sometimes incorrectly, and this seems to be the
workaround regular SHA1 code does too.
Suggested-by: Daniel Mansfield <daniel.mansfield@unsw.edu.au>
|
| |
|
|
|
|
| |
http://marc.info/?t=136018837600003&r=1&w=2
|
| |
|
|
|
|
|
|
| |
(CVE-2013-0169,CVE-2012-2686,CVE-2013-0166)
fixes #1591
|
|
|
|
| |
when building on eglibc we need versioned symbols
|
| |
|
|
|
|
|
| |
* fixed hmac oneshot flag to work as expected
* renamed the patch series, and rebased against 1.0.1c
|
|
|
|
|
|
| |
We want to handle bytes upto next block boundary, to work with
hardware from block boundary. The code incorrectly fed just the
amount of bytes in the block.
|
|
|
|
|
| |
fixes #1151
(cherry picked from commit 1831053bb87f432f0d45ccd9f7a368fc885a1d64)
|
| |
|
|
|
|
| |
fixes #1107
|
|
|
|
|
|
|
| |
Remove the unneeded 0002-apps-speed-fix; the speed utility can now
measure evp speeds with -evp flag.
Padlock autoloading patch is rebased.
|
| |
|
|
|
|
| |
fixes #935
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2011-4108
CVE-2011-4109
CVE-2011-4576
CVE-2011-4577
CVE-2011-4619
CVE-2012-0027
fixes #893
|
| |
|
|
|
|
| |
* contains security fix to CVE-2011-0014
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
- Fix for security issue CVE-2010-4180
- Fix for CVE-2010-4252
- Fix mishandling of absent EC point format extension.
- Fix various platform compilation issues.
- Corrected fix for security issue CVE-2010-3864.
|
|
|
|
| |
so we avoid /usr/lib64 on x86_64
|