Menu

Commit [r993]  Maximize  Restore  History

Update OpenSSL to 1.0.1i

tortoisesvn 2014-08-07

1 2 3 .. 6 > >> (Page 1 of 6)
changed /trunk/ext/openssl/CHANGES
changed /trunk/ext/openssl/Configure
changed /trunk/ext/openssl/FAQ
changed /trunk/ext/openssl/NEWS
changed /trunk/ext/openssl/README
changed /trunk/ext/openssl/apps/apps.c
changed /trunk/ext/openssl/apps/ca.c
changed /trunk/ext/openssl/apps/ciphers.c
changed /trunk/ext/openssl/apps/crl2p7.c
changed /trunk/ext/openssl/apps/enc.c
changed /trunk/ext/openssl/apps/ocsp.c
changed /trunk/ext/openssl/apps/progs.h
changed /trunk/ext/openssl/apps/progs.pl
changed /trunk/ext/openssl/apps/s_client.c
changed /trunk/ext/openssl/apps/s_server.c
changed /trunk/ext/openssl/crypto/asn1/a_object.c
changed /trunk/ext/openssl/crypto/asn1/a_utctm.c
changed /trunk/ext/openssl/crypto/asn1/ameth_lib.c
changed /trunk/ext/openssl/crypto/asn1/asn1_lib.c
changed /trunk/ext/openssl/crypto/asn1/asn_mime.c
changed /trunk/ext/openssl/crypto/asn1/asn_pack.c
changed /trunk/ext/openssl/crypto/asn1/bio_asn1.c
changed /trunk/ext/openssl/crypto/asn1/charmap.pl
changed /trunk/ext/openssl/crypto/asn1/evp_asn1.c
changed /trunk/ext/openssl/crypto/asn1/t_x509.c
/trunk/ext/openssl/CHANGES Diff Switch to side-by-side view
--- a/trunk/ext/openssl/CHANGES
+++ b/trunk/ext/openssl/CHANGES
@@ -1,6 +1,92 @@
 
  OpenSSL CHANGES
  _______________
+
+ Changes between 1.0.1h and 1.0.1i [6 Aug 2014]
+
+  *) Fix SRP buffer overrun vulnerability. Invalid parameters passed to the
+     SRP code can be overrun an internal buffer. Add sanity check that
+     g, A, B < N to SRP code.
+
+     Thanks to Sean Devlin and Watson Ladd of Cryptography Services, NCC
+     Group for discovering this issue.
+     (CVE-2014-3512)
+     [Steve Henson]
+
+  *) A flaw in the OpenSSL SSL/TLS server code causes the server to negotiate
+     TLS 1.0 instead of higher protocol versions when the ClientHello message
+     is badly fragmented. This allows a man-in-the-middle attacker to force a
+     downgrade to TLS 1.0 even if both the server and the client support a
+     higher protocol version, by modifying the client's TLS records.
+
+     Thanks to David Benjamin and Adam Langley (Google) for discovering and
+     researching this issue.
+     (CVE-2014-3511)
+     [David Benjamin]
+
+  *) OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject
+     to a denial of service attack. A malicious server can crash the client
+     with a null pointer dereference (read) by specifying an anonymous (EC)DH
+     ciphersuite and sending carefully crafted handshake messages.
+
+     Thanks to Felix Gröbert (Google) for discovering and researching this
+     issue.
+     (CVE-2014-3510)
+     [Emilia Käsper]
+
+  *) By sending carefully crafted DTLS packets an attacker could cause openssl
+     to leak memory. This can be exploited through a Denial of Service attack.
+     Thanks to Adam Langley for discovering and researching this issue.
+     (CVE-2014-3507)
+     [Adam Langley]
+
+  *) An attacker can force openssl to consume large amounts of memory whilst
+     processing DTLS handshake messages. This can be exploited through a
+     Denial of Service attack.
+     Thanks to Adam Langley for discovering and researching this issue.
+     (CVE-2014-3506)
+     [Adam Langley]
+
+  *) An attacker can force an error condition which causes openssl to crash
+     whilst processing DTLS packets due to memory being freed twice. This
+     can be exploited through a Denial of Service attack.
+     Thanks to Adam Langley and Wan-Teh Chang for discovering and researching
+     this issue.
+     (CVE-2014-3505)
+     [Adam Langley]
+
+  *) If a multithreaded client connects to a malicious server using a resumed
+     session and the server sends an ec point format extension it could write
+     up to 255 bytes to freed memory.
+
+     Thanks to Gabor Tyukasz (LogMeIn Inc) for discovering and researching this
+     issue.
+     (CVE-2014-3509)
+     [Gabor Tyukasz]
+
+  *) A malicious server can crash an OpenSSL client with a null pointer
+     dereference (read) by specifying an SRP ciphersuite even though it was not
+     properly negotiated with the client. This can be exploited through a
+     Denial of Service attack.
+
+     Thanks to Joonas Kuorilehto and Riku Hietamäki (Codenomicon) for
+     discovering and researching this issue.
+     (CVE-2014-5139)
+     [Steve Henson]
+
+  *) A flaw in OBJ_obj2txt may cause pretty printing functions such as
+     X509_name_oneline, X509_name_print_ex et al. to leak some information
+     from the stack. Applications may be affected if they echo pretty printing
+     output to the attacker.
+
+     Thanks to Ivan Fratric (Google) for discovering this issue.
+     (CVE-2014-3508)
+     [Emilia Käsper, and Steve Henson]
+
+  *) Fix ec_GFp_simple_points_make_affine (thus, EC_POINTs_mul etc.)
+     for corner cases. (Certain input points at infinity could lead to
+     bogus results, with non-infinity inputs mapped to infinity too.)
+     [Bodo Moeller]
 
  Changes between 1.0.1g and 1.0.1h [5 Jun 2014]
 
/trunk/ext/openssl/Configure Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/FAQ Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/NEWS Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/README Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/apps/apps.c Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/apps/ca.c Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/apps/ciphers.c Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/apps/crl2p7.c Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/apps/enc.c Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/apps/ocsp.c Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/apps/progs.h Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/apps/progs.pl Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/apps/s_client.c Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/apps/s_server.c Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/crypto/asn1/a_object.c Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/crypto/asn1/a_utctm.c Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/crypto/asn1/ameth_lib.c Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/crypto/asn1/asn1_lib.c Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/crypto/asn1/asn_mime.c Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/crypto/asn1/asn_pack.c Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/crypto/asn1/bio_asn1.c Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/crypto/asn1/charmap.pl Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/crypto/asn1/evp_asn1.c Diff Switch to side-by-side view
Loading...
/trunk/ext/openssl/crypto/asn1/t_x509.c Diff Switch to side-by-side view
Loading...
1 2 3 .. 6 > >> (Page 1 of 6)
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.