| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
| |
"In TLS connections, certain incorrectly formatted records can cause an OpenSSL
client or server to crash due to a read attempt at NULL."
http://openssl.org/news/secadv_20100324.txt
ok djm@ sthen@
|
|
|
|
|
|
|
|
|
|
|
|
| |
---------------------------
cherrypick patch from OpenSSL 0.9.8m:
*) Always check bn_wexpend() return values for failure. (CVE-2009-3245)
[Martin Olsson, Neel Mehta]
---------------------------
ok sthen@
|
|
|
|
|
|
|
|
|
| |
openssl 0.9.8l.
As suggested by markus@, for -stable the header change is being
restricted to a private file, so the minor version is not cranked here.
Discussed with markus, djm, deraadt.
|
|
|
|
| |
CVE-2009-0789).
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
"openssl s_client"), fix an unlikely memory leak
|
|
|
|
| |
the size of the diff against openssl mainline
|
|
|
|
| |
memcpy to avoid linker deprecation warnings; pointed out by dkrause@
|
|
|
|
|
| |
useful "server name indication" that allows multihomed TLS server), so
remove the #define to disable it here
|
| |
|
| |
|
|\
| |
| | |
branch.
|
| | |
|
|\ \
| | |
| | | |
branch.
|
| | | |
|
|\ \ \
| | | |
| | | | |
branch.
|
| | | | |
|
| | | | |
|
| | | |
| | | |
| | | |
| | | | |
Noticed by blambert@. Ok jmc@.
|
| | | | |
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
PAGE_(SIZE|SHIFT|MASK) defines that evaluate to variables on the
sparc architecture;
ok otto@ tested on my reanimated ss20
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
on sparc, it expands to something that just plain does not work,
because the page size can be variable. Sorry we didn't spot this
before. Backing it all out to allow sparc to build; please find a
different way to fix it.
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
(MALLOC_OPTIONS=L). It was too slow to turn on by default, and we
don't do optional security.
requested by deraadt@ grumbling ok otto@
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Move all runtime options into a structure that is made read-only
(via mprotect) after initialisation to protect against attacks that
overwrite options to turn off malloc protections (e.g. use-after-free)
Allocate the main bookkeeping data (struct dir_info) using mmap(),
thereby giving it an unpredictable address. Place a PROT_NONE guard
page on either side to further frustrate attacks on it.
Add a new 'L' option that maps struct dir_info PROT_NONE except when
in the allocator code itself. Makes attacks on it basically impossible.
feedback tedu deraadt otto canacar
ok otto
|
| | | | |
|
| | | |
| | | |
| | | |
| | | | |
Make it less ambiguous; ok gilles@ claudio@
|
| | | |
| | | |
| | | |
| | | | |
as static const
|
| | | | |
|
| | | |
| | | |
| | | |
| | | | |
Suggested by and ok claudio@, ok jmc@
|
| | | | |
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
struct in the if_msghdr instead of using sizeof() blindly. This allows us
to grow if_data without causing issues for the getifaddrs() users.
OK deraadt@ (who needs this for some cool upcomming stuff)
|
| | | |
| | | |
| | | |
| | | |
| | | | |
the page as possible (i.e. make malloc option P a default).
ok art@ millert@ krw@
|
| | | |
| | | |
| | | |
| | | |
| | | | |
a page to 0. P default will be changed in a separate commit.
ok millert@ art@ krw@
|
| | | |
| | | |
| | | |
| | | |
| | | | |
a separate symbolic constant for the leeway we allow when moving
allocations towards the end of a page. No functional change.
|
| | | | |
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
(might catch errors closer to the trouble spot) and junk fill pages just
before reuse instead of immediate (we can't access the page anyway)
since we set PROT_NONE in the F case. ok djm@
|
| | | |
| | | |
| | | |
| | | | |
ok jmc@
|
| | | | |
|
| | | |
| | | |
| | | |
| | | | |
tried and how many actually succeeded.
|
| | | | |
|
| | | |
| | | |
| | | |
| | | | |
threaded case) but much smaller working set; prompted by and ok deraadt@
|
| | | |
| | | |
| | | |
| | | |
| | | | |
non-syscalls, there's just too much code not doing the right thing on
error paths; prompted by and ok deraadt@
|
| | | |
| | | |
| | | |
| | | | |
kurt@
|
| | | |
| | | |
| | | |
| | | |
| | | | |
mapping the region next to the existing one first; there's a pretty
high chance there's a hole there we can use; ok deraadt@ tedu@
|
| | | |
| | | |
| | | |
| | | | |
too much pressure on the amaps. ok tedu@ deraadt@
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
- global function calls in .init sections (diff makes them via PLT)
- calls to global functions in aes-586.S (made static or local)
- global variable accesses in rc4-x86_64.S (now made via GOT)
from djm@large; ok miod@
|
| | | | |
|