-
Notifications
You must be signed in to change notification settings - Fork 30.4k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
147 changed files
with
1,426 additions
and
14,050 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,6 +2,50 @@ | |
OpenSSL CHANGES | ||
_______________ | ||
|
||
Changes between 1.0.1g and 1.0.1h [5 Jun 2014] | ||
|
||
*) Fix for SSL/TLS MITM flaw. An attacker using a carefully crafted | ||
handshake can force the use of weak keying material in OpenSSL | ||
SSL/TLS clients and servers. | ||
|
||
Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for discovering and | ||
researching this issue. (CVE-2014-0224) | ||
[KIKUCHI Masashi, Steve Henson] | ||
|
||
*) Fix DTLS recursion flaw. By sending an invalid DTLS handshake to an | ||
OpenSSL DTLS client the code can be made to recurse eventually crashing | ||
in a DoS attack. | ||
|
||
Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue. | ||
(CVE-2014-0221) | ||
[Imre Rad, Steve Henson] | ||
|
||
*) Fix DTLS invalid fragment vulnerability. A buffer overrun attack can | ||
be triggered by sending invalid DTLS fragments to an OpenSSL DTLS | ||
client or server. This is potentially exploitable to run arbitrary | ||
code on a vulnerable client or server. | ||
|
||
Thanks to J�ri Aedla for reporting this issue. (CVE-2014-0195) | ||
[J�ri Aedla, Steve Henson] | ||
|
||
*) Fix bug in TLS code where clients enable anonymous ECDH ciphersuites | ||
are subject to a denial of service attack. | ||
|
||
Thanks to Felix Gr�bert and Ivan Fratric at Google for discovering | ||
this issue. (CVE-2014-3470) | ||
[Felix Gr�bert, Ivan Fratric, Steve Henson] | ||
|
||
*) Harmonize version and its documentation. -f flag is used to display | ||
compilation flags. | ||
[mancha <[email protected]>] | ||
|
||
*) Fix eckey_priv_encode so it immediately returns an error upon a failure | ||
in i2d_ECPrivateKey. | ||
[mancha <[email protected]>] | ||
|
||
*) Fix some double frees. These are not thought to be exploitable. | ||
[mancha <[email protected]>] | ||
|
||
Changes between 1.0.1f and 1.0.1g [7 Apr 2014] | ||
|
||
*) A missing bounds check in the handling of the TLS heartbeat extension | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -4,7 +4,7 @@ | |
## Makefile for OpenSSL | ||
## | ||
|
||
VERSION=1.0.1g | ||
VERSION=1.0.1h | ||
MAJOR=1 | ||
MINOR=0.1 | ||
SHLIB_VERSION_NUMBER=1.0.0 | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.