| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
| |
fixes #8273
CVE-2017-3737
CVE-2017-3738
|
|
|
|
| |
By running the test suite without parallelization.
|
| |
|
|
|
|
|
| |
CVE-2017-3735
CVE-2017-3736
|
| |
|
| |
|
|
|
|
|
| |
This patch adds a target for ppc64le architecture. The target name on
OpenSSL linux-ppc64le.
|
| |
|
|
|
|
|
|
| |
the users of this should be using now libressl's certhash. and
c_rehash is planned to be moved to ca-certificates so it can
avoid dependency on libressl main package.
|
| |
|
| |
|
|
|
|
|
|
| |
ref #6206
CVE-2016-6305 and CVE-2016-6307 apparently only affects openssl-1.1.0
|
| |
|
| |
|
|
|
|
|
| |
Add a missing patch.
ref #6176
|
|
|
|
|
|
|
|
|
|
| |
fixes #6176
- CVE-2016-2179
- CVE-2016-2181
- CVE-2016-2182
- CVE-2016-6302
- CVE-2016-6303
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
CVE-2016-2107 Prevent padding oracle in AES-NI CBC MAC check
CVE-2016-2105 Fix EVP_EncodeUpdate overflow
CVE-2016-2106 Fix EVP_EncryptUpdate overflow
CVE-2016-2109 Prevent ASN.1 BIO excessive memory allocation
CVE-2016-2176 EBCDIC overread
|
| |
|
|
|
|
| |
They are not needed for keeping ABI compat
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-0800 [High severity]
CVE-2016-0705 [Low severity]
CVE-2016-0798 [Low severity]
CVE-2016-0797 [Low severity]
CVE-2016-0799 [Low severity]
CVE-2016-0702 [Low severity]
CVE-2016-0703 [High severity]
CVE-2016-0704 [Moderate severity]
|
|
|
|
|
|
| |
and clear errors
This reverts commit 29f1e13e6f54c24c5fac520555da38e763c6c45b.
|
|
|
|
|
|
|
| |
it appears they made padlock static upstream again
this fixes nodejs issues
ref #4999
|
|
|
|
| |
Fixes CVE-2016-0701, CVE-2015-3197
|
|
|
|
| |
fixes #4991
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
CVE-2015-1788 Malformed ECParameters causes infinite loop
CVE-2015-1789 Exploitable out-of-bounds read in X509_cmp_time
CVE-2015-1790 PKCS7 crash with missing EnvelopedContent
CVE-2015-1792 CMS verify infinite loop with unknown hash function
CVE-2015-1791 Race condition handling NewSessionTicket
|
|
|
|
|
| |
System wide mitigation for CVE-2012-4929. While most affected
programs turn off compression themselves, this is safer default.
|
|
|
|
|
|
| |
CVE-2015-0291, CVE-2015-0290, CVE-2015-0207, CVE-2015-0286,
CVE-2015-0208, CVE-2015-0287, CVE-2015-0289, CVE-2015-0293,
CVE-2015-1787, CVE-2015-0285, CVE-2015-0209, CVE-2015-0288
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2014-3571 DTLS segmentation fault in dtls1_get_record
CVE-2015-0206 DTLS memory leak in dtls1_buffer_record
CVE-2014-3569 no-ssl3 configuration sets method to NULL
CVE-2014-3572 ECDHE silently downgrades to ECDH [Client]
CVE-2015-0204 RSA silently downgrades to EXPORT_RSA [Client]
CVE-2015-0205 DH client certificates accepted without verification [Server]
CVE-2014-8275 Certificate fingerprints can be modified
CVE-2014-3570 Bignum squaring may produce incorrect results
|
|
|
|
| |
This reverts commit 9bb63edbc546e6253578e5050132c62839e84dff.
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
| |
Failed to rebase the manpages patch properly. This removes the hunks
that delete pages. Instead have the package script rename the affected
man pages, and update the patch only to change the cross references
of the conflicting man pages.
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2014-3508 Information leak in pretty printing functions
CVE-2014-5139 Crash with SRP ciphersuite in Server Hello message
CVE-2014-3509 Race condition in ssl_parse_serverhello_tlsext
CVE-2014-3505 Double Free when processing DTLS packets
CVE-2014-3506 DTLS memory exhaustion
CVE-2014-3507 DTLS memory leak from zero-length fragments
CVE-2014-3510 OpenSSL DTLS anonymous EC(DH) denial of service
CVE-2014-3511 OpenSSL TLS protocol downgrade attack
CVE-2014-3512 SRP buffer overrun
|
|
|
|
|
|
|
|
|
|
| |
Newly fixed CVEs:
CVE-2014-0224 SSL/TLS MITM vulnerability
CVE-2014-0221 DTLS recursion flaw
CVE-2014-0195 DTLS invalid fragment vulnerability
Previously fixed in Alpine by cherry picks:
CVE-2014-0198 SSL_MODE_RELEASE_BUFFERS NULL pointer dereference
|
|
|
|
| |
ref #2916
|
|
|
|
| |
and it also happens with freebufs on multi-threaded programs.
|
|
|
|
|
|
|
| |
This code is dubious at best and also responsible for the heartbleed vulnerability
being exposed in the first place. With the heartbleed test on a broken version, this
results in a daemon crash instead of private key exposure. We add dummy padding to
preserve ABI compatibility with older packages.
|