| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
| |
CVE-2015-0286 - Apply fix from OpenSSL for ASN1_TYPE_cmp.
CVE-2015-0292 - Backport existing fix for Base64 decoding.
|
|
|
|
| |
tested by jasper
|
|
|
|
| |
tested by bcook jsg
|
|
|
|
|
|
| |
"Avoid a buffer overflow that can be triggered by sending specially crafted
DTLS fragments. Fix for CVE-2014-0195, from OpenSSL. Reported to OpenSSL
by Juri Aedla." From d1_both.c r1.19
|
|
|
|
|
|
|
|
| |
"Do not recurse when a 'Hello Request' message is received while getting
DTLS fragments. A stream of 'Hello Request' messages will result in
infinite recursion, eventually crashing the DTLS client or server.
Fixes CVE-2014-0221, from OpenSSL. Reported to OpenSSL by Imre Rad."
From d1_both.c r1.20
|
|
|
|
|
| |
"Ensure that sess_cert is not NULL before trying to use it.
Fixes CVE-2014-3470, from OpenSSL." From s3_clnt.c r1.66
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
"Be selective as to when ChangeCipherSpec messages will be accepted.
Without this an early ChangeCipherSpec message would result in session
keys being generated, along with the Finished hash for the handshake,
using an empty master secret." From s3_clnt.c r1.64, s3_pkt.c r1.42,
s3_srvr.c r1.59, ssl3.h r1.19 - note that the ssl3.h change has been
applied to s3_locl.h instead to simplify patching.
"Ensure that we do not process a ChangeCipherSpec with an empty master
secret. This is an additional safeguard against early ChangeCipherSpec
handling." From s3_pkt.c:1.43
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
-/--------------------------
revision 1.33
date: 2014/04/24 04:31:30; author: tedu; state: Exp; lines: +4 -0;
on today's episode of things you didn't want to learn:
do_ssl3_write() is recursive. and not in the simple, obvious way, but in
the sneaky called through ssl3_dispatch_alert way. (alert level: fuchsia)
this then has a decent chance of releasing the buffer that we thought we
were going to use. check for this happening, and if the buffer has gone
missing, put another one back in place.
the direct recursive call is safe because it won't call ssl3_write_pending
which is the function that actually does do the writing and releasing.
as reported by David Ramos to openssl-dev:
http://marc.info/?l=openssl-dev&m=139809493725682&w=2
ok beck
-/--------------------------
|
|
|
|
|
|
|
|
| |
Changes by: tedu@cvs.openbsd.org 2014/04/10 13:01:37
Piotr Sikora pointed me at a more refined diff for the buffer release
issue. Apply that version. Maybe someday upstream will wake up and then
we can have the same code.
https://rt.openssl.org/Ticket/Display.html?id=2167&user=guest&pass=guest
|
|
|
|
|
| |
cherrypick fix for CVE-2014-0160 "heartbleed" vulnerability from
OpenSSL git; ok sthen@
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2013-4353 NULL pointer dereference with crafted Next Protocol
Negotiation record in TLS handshake.
Upstream: 197e0ea
CVE-2013-6449 Fix crash with crafted traffic from a TLS 1.2 client.
Upstream: ca98926, 0294b2b
CVE-2013-6450 Fix DTLS retransmission from previous session.
Upstream: 3462896
|
|
|
|
| |
like for any other process as well. OK by many
|
|
|
|
| |
add a more complete check for the rounds parameter. ok deraadt
|
|
|
|
| |
ok deraadt@ bentley@
|
| |
|
| |
|
|
|
|
|
|
| |
introduce a new 'b' hash minor. still generate 'a' minors for now.
reported by solar designer. diff by some combination of solar and jca.
ok deraadt
|
|
|
|
|
|
|
| |
the paper trail appears to be:
reported in feebsd pr docs/185353 by rol robert-eckardt de
fix suggested by peter wemm
diff submitted to tech by allan jude
|
|
|
|
|
|
| |
as per RFC 3542, from DragonFlyBSD via Eitan Adler.
ok bluhm@
|
|
|
|
| |
Patch by Jean-Philippe Ouellet ; ok krw@
|
| |
|
| |
|
|
|
|
| |
the ball rolling. ok deraadt.
|
|
|
|
| |
spotted by tedu
|
| |
|
| |
|
|
|
|
|
|
| |
marking up words that are not trademarks (ASCII, I/O, NFS, TCP, TELNET).
While here, remove .Tn markup from the same words in the body
of these pages, too.
|
|
|
|
| |
Found while testing mandocdb(8).
|
|
|
|
| |
ok gilles millert
|
|
|
|
| |
- Additionally, test _setjmp and sigsetjmp as implementations are different.
|
|
|
|
|
| |
preserved by setjmp. Currently under REGRESS_FULL as this fails
on certain archs.
|
|
|
|
|
|
|
|
|
|
| |
right __dso_handle and have dlopen'ed shared objects run their atexit handlers
when they get unloaded. This is what Linux does, and several ports depend on
this behaviour (and will crash upon exit without this chang).
Based on an earlier diff from matthew@
Tested by ajacoutot@
ok deraadt@
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
architectures. ok miod@ djm@
Upstream patch:
commit cdd1acd788020d2c525331da1712ada778f1373c
Author: Andy Polyakov <appro@openssl.org>
Date: Wed Dec 18 21:27:35 2013 +0100
|
| |
|
|
|
|
| |
Requested by deraadt@
|
| |
|
|
|
|
| |
days.
|
|
|
|
| |
as advised by deraadt
|
|
|
|
| |
re-re-reviewed by krw
|
| |
|
|
|
|
| |
ok jca krw ingo
|
|
|
|
| |
ok deraadt@
|
|
|
|
| |
not urgent.
|
|
|
|
| |
ok guenther otto
|
|
|
|
|
|
|
|
|
| |
correctly when moving the directory pointer by small distances.
This is currently failing, i will send an updated libc/gen patch
to fix this right afterwards.
Move the functions createfiles() and delfiles() to utils.{h,c} for reuse.
Minor cleanup in telldir.c.
|
|
|
|
| |
ok deraadt@
|
|
|
|
|
| |
same style as traceroute6 (change to int and use -1 as a flag, so rtable 0
can still be used as an explicit parameter).
|