Package: openssl / 1.0.1k-3
Metadata
Package | Version | Patches format |
---|---|---|
openssl | 1.0.1k-3 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
ca.patch | (download) |
apps/CA.pl.in |
2 2 + 0 - 0 ! |
--- |
config hurd.patch | (download) |
config |
4 2 + 2 - 0 ! |
--- |
debian targets.patch | (download) |
Configure |
53 53 + 0 - 0 ! |
--- |
engines path.patch | (download) |
Configure |
2 1 + 1 - 0 ! |
--- |
man dir.patch | (download) |
Makefile.org |
2 1 + 1 - 0 ! |
--- |
man section.patch | (download) |
Makefile.org |
7 4 + 3 - 0 ! |
--- |
no rpath.patch | (download) |
Makefile.shared |
2 1 + 1 - 0 ! |
--- |
no symbolic.patch | (download) |
Makefile.shared |
2 1 + 1 - 0 ! |
--- |
pic.patch | (download) |
crypto/des/asm/desboth.pl |
17 14 + 3 - 0 ! |
--- |
valgrind.patch | (download) |
crypto/rand/md_rand.c |
2 2 + 0 - 0 ! |
--- |
rehash crt.patch | (download) |
tools/c_rehash.in |
12 9 + 3 - 0 ! |
--- |
shared lib ext.patch | (download) |
Configure |
3 2 + 1 - 0 ! |
--- |
stddef.patch | (download) |
crypto/sha/sha.h |
1 1 + 0 - 0 ! |
--- |
version script.patch | (download) |
Configure |
2 2 + 0 - 0 ! |
--- |
c_rehash compat.patch | (download) |
tools/c_rehash.in |
8 7 + 1 - 0 ! |
[patch] also create old hash for compatibility |
block_diginotar.patch | (download) |
crypto/x509/x509_vfy.c |
27 27 + 0 - 0 ! |
make x509_verify_cert indicate that any certificate whose name contains "DigiNotar" is revoked. |
block_digicert_malaysia.patch | (download) |
crypto/x509/x509_vfy.c |
7 4 + 3 - 0 ! |
make x509_verify_cert indicate that any certificate whose name contains "Digicert Sdn. Bhd." (from Malaysia) is revoked. |
defaults.patch | (download) |
apps/dhparam.c |
4 2 + 2 - 0 ! |
change default bit size and digest Date: Fri, 01 Nov 2013 20:47:14 +0100 |
openssl_fix_for_x32.patch | (download) |
crypto/bn/asm/x86_64-gcc.c |
14 7 + 7 - 0 ! |
--- |
ppc64el.patch | (download) |
crypto/aes/asm/aes-ppc.pl |
113 100 + 13 - 0 ! |
--- |
0006 Fix reachable assert in SSLv2 servers.patch | (download) |
ssl/s2_lib.c |
2 1 + 1 - 0 ! |
[patch 6/6] fix reachable assert in sslv2 servers. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This assert is reachable for servers that support SSLv2 and export ciphers. Therefore, such servers can be DoSed by sending a specially crafted SSLv2 CLIENT-MASTER-KEY. Also fix s2_srvr.c to error out early if the key lengths are malformed. These lengths are sent unencrypted, so this does not introduce an oracle. CVE-2015-0293 This issue was discovered by Sean Burford (Google) and Emilia Ksper of the OpenSSL development team. |
0005 PKCS 7 avoid NULL pointer dereferences with missing .patch | (download) |
crypto/pkcs7/pk7_doit.c |
94 76 + 18 - 0 ! |
[patch 5/6] pkcs#7: avoid null pointer dereferences with missing content In PKCS#7, the ASN.1 content component is optional. This typically applies to inner content (detached signatures), however we must also handle unexpected missing outer content correctly. This patch only addresses functions reachable from parsing, decryption and verification, and functions otherwise associated with reading potentially untrusted data. Correcting all low-level API calls requires further work. CVE-2015-0289 Thanks to Michal Zalewski (Google) for reporting this issue. |
0004 Fix ASN1_TYPE_cmp.patch | (download) |
crypto/asn1/a_type.c |
3 3 + 0 - 0 ! |
[patch 4/6] fix asn1_type_cmp Fix segmentation violation when ASN1_TYPE_cmp is passed a boolean type. This can be triggered during certificate verification so could be a DoS attack against a client or a server enabling client authentication. CVE-2015-0286 |
0002 Free up ADB and CHOICE if already initialised.patch | (download) |
crypto/asn1/tasn_dec.c |
24 21 + 3 - 0 ! |
[patch 2/6] free up adb and choice if already initialised. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit CVE-2015-0287 |
0001 fix warning.patch | (download) |
ssl/ssl_locl.h |
6 3 + 3 - 0 ! |
[patch 1/6] fix warning |
0001 Remove export ciphers from the DEFAULT cipher list.patch | (download) |
doc/apps/ciphers.pod |
4 2 + 2 - 0 ! |
[patch] remove export ciphers from the default cipher list They are moved to the COMPLEMENTOFDEFAULT instead. This also fixes SSLv2 to be part of COMPLEMENTOFDEFAULT. |
0001 Make DTLS always act as if read_ahead is set. The ac.patch | (download) |
ssl/s3_pkt.c |
3 2 + 1 - 0 ! |
[patch] make dtls always act as if read_ahead is set. the actual value of read_ahead is ignored for DTLS. RT#3657 |
0001 Fix a failure to NULL a pointer freed on error.patch | (download) |
crypto/ec/ec_asn1.c |
6 3 + 3 - 0 ! |
[patch] fix a failure to null a pointer freed on error. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Inspired by BoringSSL commit 517073cd4b by Eric Roman <eroman@chromium.org> CVE-2015-0209 |
0001 Check public key is not NULL.patch | (download) |
crypto/x509/x509_req.c |
2 2 + 0 - 0 ! |
[patch] check public key is not null. CVE-2015-0288 PR#3708 |
0008 Fix a failure to NULL a pointer freed on error.patch | (download) |
crypto/asn1/x_x509.c |
12 11 + 1 - 0 ! |
[patch 08/12] fix a failure to null a pointer freed on error. Reported by the LibreSSL project as a follow on to CVE-2015-0209 |