Package: openssl / 0.9.8o-4squeeze23
Metadata
Package | Version | Patches format |
---|---|---|
openssl | 0.9.8o-4squeeze23 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
ca.patch | (download) |
apps/CA.pl.in |
2 2 + 0 - 0 ! |
--- |
config hurd.patch | (download) |
config |
4 2 + 2 - 0 ! |
--- |
debian targets.patch | (download) |
Configure |
45 45 + 0 - 0 ! |
--- |
engines path.patch | (download) |
Configure |
2 1 + 1 - 0 ! |
--- |
kfreebsd pipe.patch | (download) |
crypto/perlasm/x86_64-xlate.pl |
2 1 + 1 - 0 ! |
--- |
make targets.patch | (download) |
Makefile.org |
2 1 + 1 - 0 ! |
--- |
man dir.patch | (download) |
Makefile.org |
2 1 + 1 - 0 ! |
--- |
man section.patch | (download) |
Makefile.org |
7 4 + 3 - 0 ! |
--- |
no rpath.patch | (download) |
Makefile.shared |
2 1 + 1 - 0 ! |
--- |
no symbolic.patch | (download) |
Makefile.shared |
2 1 + 1 - 0 ! |
--- |
pic.patch | (download) |
crypto/Makefile |
4 2 + 2 - 0 ! |
--- |
pkg config.patch | (download) |
Makefile.org |
9 6 + 3 - 0 ! |
--- |
valgrind.patch | (download) |
crypto/rand/md_rand.c |
2 2 + 0 - 0 ! |
--- |
rc4 amd64.patch | (download) |
Configure |
3 3 + 0 - 0 ! |
--- |
rehash crt.patch | (download) |
tools/c_rehash.in |
12 9 + 3 - 0 ! |
--- |
rehash_pod.patch | (download) |
doc/apps/c_rehash.pod |
55 55 + 0 - 0 ! |
--- |
shared lib ext.patch | (download) |
Configure |
3 2 + 1 - 0 ! |
--- |
stddef.patch | (download) |
crypto/sha/sha.h |
1 1 + 0 - 0 ! |
--- |
version script.patch | (download) |
Configure |
2 2 + 0 - 0 ! |
--- |
perl path.diff | (download) |
Configure |
2 1 + 1 - 0 ! |
change the perl path's to /usr/bin/perl This is the result of running: perl util/perlpath.pl /usr/bin |
CVE 2010 2939.patch | (download) |
ssl/s3_clnt.c |
1 1 + 0 - 0 ! |
--- |
CVE 2010 3864.patch | (download) |
ssl/t1_lib.c |
18 14 + 4 - 0 ! |
--- |
CVE 2010 4180.patch | (download) |
doc/ssl/SSL_CTX_set_options.pod |
13 1 + 12 - 0 ! |
--- |
CVE 2011 0014.patch | (download) |
ssl/t1_lib.c |
8 7 + 1 - 0 ! |
--- |
block_diginotar.patch | (download) |
crypto/x509/x509_vfy.c |
27 27 + 0 - 0 ! |
make x509_verify_cert indicate that any certificate whose name contains "DigiNotar" is revoked. |
block_digicert_malaysia.patch | (download) |
crypto/x509/x509_vfy.c |
7 4 + 3 - 0 ! |
make x509_verify_cert indicate that any certificate whose name contains "Digicert Sdn. Bhd." (from Malaysia) is revoked. |
CVE 2011 1945.patch | (download) |
crypto/ecdsa/ecs_ossl.c |
8 8 + 0 - 0 ! |
fix cve-2011-1945, timing attacks against ecdhe_ecdsa makes it easier to determine private keys. |
CVE 2011 3210.patch | (download) |
ssl/s3_lib.c |
6 6 + 0 - 0 ! |
fix ssl memory handling for (ec)dh ciphersuites, in particular for multi-threaded use of ECDH. |
CVE 2011 4108.patch | (download) |
ssl/d1_pkt.c |
25 16 + 9 - 0 ! |
--- |
CVE 2011 4109.patch | (download) |
crypto/x509v3/pcy_map.c |
10 6 + 4 - 0 ! |
--- |
CVE 2011 4619.patch | (download) |
ssl/s3_srvr.c |
9 9 + 0 - 0 ! |
--- |
CVE 2011 4576.patch | (download) |
ssl/s3_enc.c |
3 3 + 0 - 0 ! |
--- |
CVE 2011 4577.patch | (download) |
crypto/x509v3/v3_addr.c |
74 47 + 27 - 0 ! |
--- |
dtls fragment alert.patch | (download) |
ssl/d1_both.c |
15 13 + 2 - 0 ! |
--- |
CVE 2012 0050.patch | (download) |
ssl/d1_pkt.c |
17 7 + 10 - 0 ! |
--- |
CVE 2012 0884.patch | (download) |
apps/cms.c |
4 4 + 0 - 0 ! |
--- |
CVE 2012 1165.patch | (download) |
crypto/asn1/asn_mime.c |
5 5 + 0 - 0 ! |
--- |
CVE 2012 2110.patch | (download) |
crypto/asn1/a_d2i_fp.c |
54 40 + 14 - 0 ! |
--- |
CVE 2012 2131.patch | (download) |
crypto/buffer/buffer.c |
10 10 + 0 - 0 ! |
--- |
CVE 2012 2333.patch | (download) |
ssl/d1_enc.c |
2 1 + 1 - 0 ! |
--- |
CVE 2013 0169.patch | (download) |
crypto/cryptlib.c |
16 16 + 0 - 0 ! |
fix cve-2013-0169.patch |
CVE 2013 0166.patch | (download) |
crypto/asn1/a_verify.c |
6 6 + 0 - 0 ! |
cve-2013-0166 Don't try and verify signatures if key is NULL (CVE-2013-0166) Add additional check to catch this in ASN1_item_verify too. |
CVE 2014 0076.patch | (download) |
crypto/bn/bn.h |
11 11 + 0 - 0 ! |
--- |
CVE 2014 0195.patch | (download) |
ssl/d1_both.c |
9 9 + 0 - 0 ! |
--- |
CVE 2014 0221.patch | (download) |
ssl/d1_both.c |
4 2 + 2 - 0 ! |
--- |
CVE 2014 3470.patch | (download) |
ssl/s3_clnt.c |
7 7 + 0 - 0 ! |
--- |
CVE 2014 0224.patch | (download) |
ssl/s3_clnt.c |
3 3 + 0 - 0 ! |
--- |
CVE 2012 4929.patch | (download) |
ssl/ssl_ciph.c |
2 1 + 1 - 0 ! |
disable zlib compression by default This fixes CVE-2012-4929 (CRiME). |
Avoid double free when processing DTLS packets.patch | (download) |
ssl/d1_both.c |
6 2 + 4 - 0 ! |
[patch 01/10] avoid double free when processing dtls packets. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The |item| variable, in both of these cases, may contain a pointer to a |pitem| structure within |s->d1->buffered_messages|. It was being freed in the error case while still being in |buffered_messages|. When the error later caused the |SSL*| to be destroyed, the item would be double freed. Thanks to Wah-Teh Chang for spotting that the fix in 1632ef74 was inconsistent with the other error paths (but correct). Fixes CVE-2014-3505 |
Added comment for the frag reassembly NULL case as p.patch | (download) |
ssl/d1_both.c |
3 2 + 1 - 0 ! |
[patch 02/10] added comment for the frag->reassembly == null case as per feedback from Emilia MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit |
Fix DTLS handshake message size checks.patch | (download) |
ssl/d1_both.c |
29 16 + 13 - 0 ! |
[patch 03/10] fix dtls handshake message size checks. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit In |dtls1_reassemble_fragment|, the value of |msg_hdr->frag_off+frag_len| was being checked against the maximum handshake message size, but then |msg_len| bytes were allocated for the fragment buffer. This means that so long as the fragment was within the allowed size, the pending handshake message could consume 16MB + 2MB (for the reassembly bitmap). Approx 10 outstanding handshake messages are allowed, meaning that an attacker could consume ~180MB per DTLS connection. In the non-fragmented path (in |dtls1_process_out_of_seq_message|), no check was applied. Fixes CVE-2014-3506 Wholly based on patch by Adam Langley with one minor amendment. |
Fix memory leak from zero length DTLS fragments.patch | (download) |
ssl/d1_both.c |
22 19 + 3 - 0 ! |
[patch 04/10] fix memory leak from zero-length dtls fragments. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The |pqueue_insert| function can fail if one attempts to insert a duplicate sequence number. When handling a fragment of an out of sequence message, |dtls1_process_out_of_seq_message| would not call |dtls1_reassemble_fragment| if the fragment's length was zero. It would then allocate a fresh fragment and attempt to insert it, but ignore the return value, leaking the fragment. This allows an attacker to exhaust the memory of a DTLS peer. Fixes CVE-2014-3507 |
Fix return code for truncated DTLS fragment.patch | (download) |
ssl/d1_both.c |
4 3 + 1 - 0 ! |
[patch 05/10] fix return code for truncated dtls fragment. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Previously, a truncated DTLS fragment in |dtls1_process_out_of_seq_message| would cause *ok to be cleared, but the return value would still be the number of bytes read. This would cause |dtls1_get_message| not to consider it an error and it would continue processing as normal until the calling function noticed that *ok was zero. I can't see an exploit here because |dtls1_get_message| uses |s->init_num| as the length, which will always be zero from what I can see. |
Applying same fix as in dtls1_process_out_of_seq_mes.patch | (download) |
ssl/d1_both.c |
4 3 + 1 - 0 ! |
[patch 06/10] applying same fix as in dtls1_process_out_of_seq_message. A truncated DTLS fragment would cause *ok to be clear, but the return value would still be the number of bytes read. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Problem identified by Emilia Ksper, based on previous issue/patch by Adam Langley. |
Remove some duplicate DTLS code.patch | (download) |
ssl/d1_both.c |
8 4 + 4 - 0 ! |
[patch 07/10] remove some duplicate dtls code. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit In |dtls1_process_out_of_seq_message|, we know that |frag_len| <= |msg_hdr->msg_len| so the later tests for |frag_len < msg_hdr->msg_len| can be more clearly written as |frag_len != msg_hdr->msg_len|, since that's the only remaining case. |
Fix protocol downgrade bug in case of fragmented pac.patch | (download) |
ssl/s23_srvr.c |
30 23 + 7 - 0 ! |
[patch 08/10] fix protocol downgrade bug in case of fragmented packets MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit CVE-2014-3511 |
Fix DTLS anonymous EC DH denial of service.patch | (download) |
ssl/d1_clnt.c |
16 14 + 2 - 0 ! |
[patch 09/10] fix dtls anonymous ec(dh) denial of service CVE-2014-3510 |
Fix OID handling.patch | (download) |
crypto/asn1/a_object.c |
30 21 + 9 - 0 ! |
[patch 10/10] fix oid handling: - Upon parsing, reject OIDs with invalid base-128 encoding. - Always NUL-terminate the destination buffer in OBJ_obj2txt printing function. CVE-2014-3508 |
fallback_scsv.patch | (download) |
apps/s_client.c |
10 10 + 0 - 0 ! |
--- |
CVE 2014 3568.patch | (download) |
ssl/s23_clnt.c |
9 7 + 2 - 0 ! |
--- |