aboutsummaryrefslogtreecommitdiffstats
path: root/main/openssl
Commit message (Collapse)AuthorAgeFilesLines
* main/openssl: security upgrade to 1.0.2q - CVE-2018-0734 - CVE-2018-54073.3-stableJ0WI2018-11-221-4/+8
|
* main/openssl: upgrade to 1.0.2pNatanael Copa2018-11-223-74/+3
|
* main/openssl: fix CVE-2018-0732 and CVE-2018-0737Timo Teräs2018-11-223-1/+75
| | | | | fixes #8814 fixes #9009
* main/openssl: security upgrade to 1.0.2oAndy Postnikov2018-11-221-3/+6
| | | | CVE-2017-3738, CVE-2018-0739, CVE-2018-0733
* main/openssl: security upgrade to 1.0.2nColin Williams2018-11-221-32/+5
| | | | | | | | | fixes #8277 CVE-2017-3737 CVE-2017-3738 (cherry picked from commit b74e9ca7e1962c168d79fc1d11039d7febd5b0e6)
* main/openssl: security upgrade to 1.0.2mAndy Postnikov2017-11-091-4/+7
| | | | | | | CVE-2017-3735 CVE-2017-3736 fixes #8117
* main/openssl: security upgrade to 1.0.2kTimo Teräs2017-01-261-4/+8
| | | | | | | | - CVE-2017-3731 - CVE-2017-3732 - CVE-2016-7055 (cherry picked from commit 3eb2d51b3b6d1670a7763dddd331789b32fc36ad)
* main/openssl: security upgrade to 1.0.2j (CVE-2016-7052)Natanael Copa2016-10-181-4/+6
| | | | fixes #6242
* main/openssl: upgrade to 1.0.2iNatanael Copa2016-09-2210-1376/+12
| | | | | | | | fixes #6208 - CVE-2016-2183 - CVE-2016-6304 - CVE-2016-6306
* main/openssl: fix patch for CVE-2016-2181Natanael Copa2016-09-192-5/+34
| | | | | Add a missing patch. ref #6178
* main/openssl: backport various secfixesNatanael Copa2016-09-197-4/+930
| | | | | | | | | | fixes #6178 - CVE-2016-2179 - CVE-2016-2181 - CVE-2016-2182 - CVE-2016-6302 - CVE-2016-6303
* main/openssl: fix for CVE-2016-2180Daniel Sabogal2016-09-092-4/+46
| | | | | | fixes #6117 (cherry picked from commit ecfc04f3961ec4ffa2c972bd72253ba1a03a3c1e)
* main/openssl: security fix for CVE-2016-2177, CVE-2016-2178Natanael Copa2016-06-223-4/+395
|
* main/openssl: security upgrade to 1.0.2hTimo Teräs2016-05-041-5/+5
| | | | | | | | CVE-2016-2107 Prevent padding oracle in AES-NI CBC MAC check CVE-2016-2105 Fix EVP_EncodeUpdate overflow CVE-2016-2106 Fix EVP_EncryptUpdate overflow CVE-2016-2109 Prevent ASN.1 BIO excessive memory allocation CVE-2016-2176 EBCDIC overread
* main/openssl: security upgrade to 1.0.2gNatanael Copa2016-03-011-4/+5
| | | | | | | | | | | CVE-2016-0800 [High severity] CVE-2016-0705 [Low severity] CVE-2016-0798 [Low severity] CVE-2016-0797 [Low severity] CVE-2016-0799 [Low severity] CVE-2016-0702 [Low severity] fixes #5207
* main/openssl: security upgrade to 1.0.2fTimo Teräs2016-01-281-4/+4
| | | | Fixes CVE-2016-0701, CVE-2015-3197
* main/openssl: new upstream version 1.0.2eChristian Kampka2015-12-042-152/+138
|
* main/openssl: security upgrade to 1.0.1d (CVE-2015-1793)Timo Teräs2015-07-092-26/+21
|
* main/openssl: upgrade to 1.0.2cTimo Teräs2015-06-152-130/+4
|
* main/openssl: security upgrade to 1.0.2bTimo Teräs2015-06-123-33/+134
| | | | | | | | CVE-2015-1788 Malformed ECParameters causes infinite loop CVE-2015-1789 Exploitable out-of-bounds read in X509_cmp_time CVE-2015-1790 PKCS7 crash with missing EnvelopedContent CVE-2015-1792 CMS verify infinite loop with unknown hash function CVE-2015-1791 Race condition handling NewSessionTicket
* main/openssl: fix rpath and turn off ssl compression by defaultTimo Teräs2015-03-277-20/+76
| | | | | System wide mitigation for CVE-2012-4929. While most affected programs turn off compression themselves, this is safer default.
* main/openssl: security upgrade to 1.0.2aTimo Teräs2015-03-193-77/+58
| | | | | | CVE-2015-0291, CVE-2015-0290, CVE-2015-0207, CVE-2015-0286, CVE-2015-0208, CVE-2015-0287, CVE-2015-0289, CVE-2015-0293, CVE-2015-1787, CVE-2015-0285, CVE-2015-0209, CVE-2015-0288
* main/openssl: add missing patchesTimo Teräs2015-02-235-0/+1129
|
* main/openssl: upgrade to 1.0.2 and rebase all patchesTimo Teräs2015-02-2319-6411/+889
|
* main/openssl: upgrade to 1.0.1lNatanael Copa2015-01-191-4/+4
|
* main/openssl: security upgrade to 1.0.1kTimo Teräs2015-01-092-29/+19
| | | | | | | | | | | CVE-2014-3571 DTLS segmentation fault in dtls1_get_record CVE-2015-0206 DTLS memory leak in dtls1_buffer_record CVE-2014-3569 no-ssl3 configuration sets method to NULL CVE-2014-3572 ECDHE silently downgrades to ECDH [Client] CVE-2015-0204 RSA silently downgrades to EXPORT_RSA [Client] CVE-2015-0205 DH client certificates accepted without verification [Server] CVE-2014-8275 Certificate fingerprints can be modified CVE-2014-3570 Bignum squaring may produce incorrect results
* Revert "main/openssl: upgrade to 1.0.1k"Bartłomiej Piotrowski2015-01-081-4/+4
| | | | This reverts commit 9bb63edbc546e6253578e5050132c62839e84dff.
* main/openssl: upgrade to 1.0.1kBartłomiej Piotrowski2015-01-081-4/+4
|
* main/openssl: upgrade to 1.0.1jNatanael Copa2014-10-151-5/+5
|
* main/openssl: enable accelerated NIST P-224 and P-256 on x86_64Bartłomiej Piotrowski2014-10-121-3/+4
|
* main/openssl: fix man-pages properlyTimo Teräs2014-08-072-95/+49
| | | | | | | Failed to rebase the manpages patch properly. This removes the hunks that delete pages. Instead have the package script rename the affected man pages, and update the patch only to change the cross references of the conflicting man pages.
* main/openssl: remove conflicting man pagesTimo Teräs2014-08-071-2/+6
|
* main/openssl: security ugprade to 1.0.1i (multiple CVE)Timo Teräs2014-08-072-635/+7
| | | | | | | | | | | | CVE-2014-3508 Information leak in pretty printing functions CVE-2014-5139 Crash with SRP ciphersuite in Server Hello message CVE-2014-3509 Race condition in ssl_parse_serverhello_tlsext CVE-2014-3505 Double Free when processing DTLS packets CVE-2014-3506 DTLS memory exhaustion CVE-2014-3507 DTLS memory leak from zero-length fragments CVE-2014-3510 OpenSSL DTLS anonymous EC(DH) denial of service CVE-2014-3511 OpenSSL TLS protocol downgrade attack CVE-2014-3512 SRP buffer overrun
* main/openssl: security upgrade to 1.0.1h (multiple CVE)Timo Teräs2014-06-054-121/+11
| | | | | | | | | | Newly fixed CVEs: CVE-2014-0224 SSL/TLS MITM vulnerability CVE-2014-0221 DTLS recursion flaw CVE-2014-0195 DTLS invalid fragment vulnerability Previously fixed in Alpine by cherry picks: CVE-2014-0198 SSL_MODE_RELEASE_BUFFERS NULL pointer dereference
* main/openssl: security fix to CVE-2014-0198Timo Teräs2014-05-292-1/+42
| | | | ref #2916
* main/openssl: fix use after free happening without freebufsTimo Teräs2014-04-112-4/+21
| | | | and it also happens with freebufs on multi-threaded programs.
* main/openssl: disable free(2) caching in ssl codeWilliam Pitcock2014-04-092-4/+22
| | | | | | | This code is dubious at best and also responsible for the heartbleed vulnerability being exposed in the first place. With the heartbleed test on a broken version, this results in a daemon crash instead of private key exposure. We add dummy padding to preserve ABI compatibility with older packages.
* main/openssl: upgrade to 1.0.1gTimo Teräs2014-04-071-4/+4
| | | | | - fix for CVE-2014-0160 - fix for CVE-2014-0076
* main/openssl: build fixesNatanael Copa2014-01-102-5/+346
| | | | | fixes parallel build and linking to dynamic libcrypto of c_rehash in case openssl-dev is not installed.
* main/openssl: security upgrade to 1.0.1fTimo Teräs2014-01-072-32/+5
| | | | | | | * Don't include gmt_unix_time in TLS server and client random values * Fix for TLS record tampering bug CVE-2013-4353 * Fix for TLS version checking bug CVE-2013-6449 * Fix for DTLS retransmission bug CVE-2013-6450
* main/openssl: fix musl build of c_rehash (missing include)Timo Teräs2014-01-032-3/+4
|
* main/openssl: rewrite c_rehash in C for speedTimo Teräs2013-12-313-165/+243
| | | | fixes #2533
* main/openssl: speed improvements for c_rehash.shTimo Teräs2013-12-262-83/+30
|
* main/openssl: don't use rdrand engine as defaultTimo Teräs2013-12-172-1/+28
| | | | As security measure, do not rely solely on hardware random source.
* main/openssl: fix makedepends for crosscompilingTimo Teräs2013-10-181-1/+3
|
* main/openssl: replace c_rehash perl script with shell scriptNatanael Copa2013-10-022-5/+223
| | | | | | from http://cvs.pld-linux.org/cgi-bin/viewvc.cgi/cvs/packages/openssl/openssl-c_rehash.sh ref #2266
* [all autotools packages]: normalize ./configureTimo Teräs2013-07-301-1/+2
|
* main/openssl: support crosscompiling, arm and muslTimo Teräs2013-07-082-2/+36
|
* main/openssl: fix openssl tools default CApathTimo Teräs2013-06-152-5/+111
| | | | Apply patch from openssl rt.
* main/openssl: update padlock sha1 patchTimo Teräs2013-03-052-5/+5
| | | | | | | | | Add EVP_MD_FLAG_PKEY_METHOD_SIGNATURE to padlock_sha1_md to fix DSA/SHA1 verification in certain cases. Seems that NID_sha1 instead of NID_dss is used sometimes incorrectly, and this seems to be the workaround regular SHA1 code does too. Suggested-by: Daniel Mansfield <daniel.mansfield@unsw.edu.au>