[openssl-commits] [web] master update
Mark J. Cox
mark at openssl.org
Mon Jan 29 14:49:39 UTC 2018
The branch master has been updated
via d1965e911dbe4ef77506e13620506893824599fa (commit)
from da182c3f485c97c79091873398af254ee2984da3 (commit)
- Log -----------------------------------------------------------------
commit d1965e911dbe4ef77506e13620506893824599fa
Author: Mark J. Cox <mark at awe.com>
Date: Mon Jan 29 14:49:07 2018 +0000
Move the git hash links to the respective 'fixed' sections so they show up on the vulnerabilities page
-----------------------------------------------------------------------
Summary of changes:
news/vulnerabilities.xml | 45 +++++++++++++++++++++++++++------------------
1 file changed, 27 insertions(+), 18 deletions(-)
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index 27cea1d..b5fcb27 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -4383,7 +4383,9 @@ service by sending invalid encodings.
<issue public="20020808">
<cve name="2002-1568"/>
<affects base="0.9.6" version="0.9.6e"/>
- <fixed base="0.9.6" version="0.9.6f" date="20020808"/>
+ <fixed base="0.9.6" version="0.9.6f" date="20020808">
+ <git hash="517a0e7fa0f5453c860a3aec17b678bd55d5aad7"/>
+ </fixed>
<description>
The use of assertions when detecting buffer overflow attacks
allowed remote attackers to cause a denial of service (crash) by
@@ -4392,7 +4394,6 @@ OpenSSL to abort from a failed assertion, as demonstrated using SSLv2
CLIENT_MASTER_KEY messages, which were not properly handled in
s2_srvr.c.
</description>
- <git hash="517a0e7fa0f5453c860a3aec17b678bd55d5aad7"/>
</issue>
<issue public="20030219">
@@ -4642,9 +4643,10 @@ use Kerberos ciphersuites and will therefore be unaffected.
<affects base="0.9.6" version="0.9.6k"/>
<affects base="0.9.6" version="0.9.6l"/>
<affects base="0.9.6" version="0.9.6m"/>
- <fixed base="0.9.7" version="0.9.7f" date="20050322"/>
+ <fixed base="0.9.7" version="0.9.7f" date="20050322">
+ <git hash="5fee606442a6738fd06a756d7076be53b7b7734c"/>
+ </fixed>
<fixed base="0.9.6" version="0.9.6-cvs" date="20041114"/>
- <git hash="5fee606442a6738fd06a756d7076be53b7b7734c"/>
<!-- der_chop was removed 20041114 -->
<description>
@@ -5097,9 +5099,10 @@ read, for example RSA public keys.
<affects base="0.9.8" version="0.9.8f"/>
<affects base="0.9.8" version="0.9.8g"/>
<affects base="0.9.8" version="0.9.8h"/>
- <fixed base="0.9.8" version="0.9.8i" date="20080915"/>
+ <fixed base="0.9.8" version="0.9.8i" date="20080915">
+ <git hash="1cbf663a6c89dcf8f7706d30a8bae675e2e0199a"/>
+ </fixed>
<reported source="Alex Lam"/>
- <git hash="1cbf663a6c89dcf8f7706d30a8bae675e2e0199a"/>
<description>
Fix a NULL pointer dereference if a DTLS server recieved
ChangeCipherSpec as first record.
@@ -5169,7 +5172,9 @@ remote attacker could use this flaw to cause a DTLS server to crash.
<affects base="0.9.8" version="0.9.8j"/>
<affects base="0.9.8" version="0.9.8k"/>
<affects base="0.9.8" version="0.9.8l"/>
- <fixed base="0.9.8" version="0.9.8m" date="20100120"/>
+ <fixed base="0.9.8" version="0.9.8m" date="20100120">
+ <git hash="88b48dc68024dcc437da4296c9fb04419b0ccbe1"/>
+ </fixed>
<reported source="Daniel Mentz, Robin Seggelmann"/>
<description>
Fix a denial of service flaw in the DTLS implementation.
@@ -5179,7 +5184,6 @@ currently no limitation to this buffer allowing an attacker to perform
a DOS attack to a DTLS server by sending records with future epochs until there is no
memory left.
</description>
- <git hash="88b48dc68024dcc437da4296c9fb04419b0ccbe1"/>
</issue>
<issue public="20090512">
@@ -5198,9 +5202,10 @@ memory left.
<affects base="0.9.8" version="0.9.8j"/>
<affects base="0.9.8" version="0.9.8k"/>
<affects base="0.9.8" version="0.9.8l"/>
- <fixed base="0.9.8" version="0.9.8m" date="20100120"/>
+ <fixed base="0.9.8" version="0.9.8m" date="20100120">
+ <git hash="abda7c114791fa7fe95672ec7a66fc4733c40dbc"/>
+ </fixed>
<reported source="Daniel Mentz, Robin Seggelmann"/>
- <git hash="abda7c114791fa7fe95672ec7a66fc4733c40dbc"/>
<description>
Fix a denial of service flaw in the DTLS implementation.
In dtls1_process_out_of_seq_message() the check if the current message
@@ -5227,9 +5232,10 @@ left.
<affects base="0.9.8" version="0.9.8j"/>
<affects base="0.9.8" version="0.9.8k"/>
<affects base="0.9.8" version="0.9.8l"/>
- <fixed base="0.9.8" version="0.9.8m" date="20100120"/>
+ <fixed base="0.9.8" version="0.9.8m" date="20100120">
+ <git hash="561cbe567846a376153bea7f1f2d061e78029c2d"/>
+ </fixed>
<reported source="Daniel Mentz, Robin Seggelmann"/>
- <git hash="561cbe567846a376153bea7f1f2d061e78029c2d"/>
<description>
Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment
function could cause a client accessing a malicious DTLS server to
@@ -5252,8 +5258,9 @@ left.
<affects base="0.9.8" version="0.9.8j"/>
<affects base="0.9.8" version="0.9.8k"/>
<affects base="0.9.8" version="0.9.8l"/>
- <fixed base="0.9.8" version="0.9.8m" date="20100120"/>
- <git hash="1b31b5ad560b16e2fe1cad54a755e3e6b5e778a3"/>
+ <fixed base="0.9.8" version="0.9.8m" date="20100120">
+ <git hash="1b31b5ad560b16e2fe1cad54a755e3e6b5e778a3"/>
+ </fixed>
<reported source="Michael K Johnson and Andy Grimm (rPath)"/>
<description>
A memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c
@@ -5278,8 +5285,9 @@ function.
<affects base="0.9.8" version="0.9.8j"/>
<affects base="0.9.8" version="0.9.8k"/>
<affects base="0.9.8" version="0.9.8l"/>
- <fixed base="0.9.8" version="0.9.8m" date="20100120"/>
- <git hash="7e4cae1d2f555cbe9226b377aff4b56c9f7ddd4d"/>
+ <fixed base="0.9.8" version="0.9.8m" date="20100120">
+ <git hash="7e4cae1d2f555cbe9226b377aff4b56c9f7ddd4d"/>
+ </fixed>
<reported source="Martin Olsson, Neel Mehta"/>
<description>
It was discovered that OpenSSL did not always check the return value of the
@@ -5305,8 +5313,9 @@ or, possibly, execute arbitrary code
<affects base="0.9.8" version="0.9.8k"/>
<affects base="0.9.8" version="0.9.8l"/>
<affects base="0.9.8" version="0.9.8m"/>
- <fixed base="0.9.8" version="0.9.8n" date="20100324"/>
- <git hash="cca1cd9a3447dd067503e4a85ebd1679ee78a48e"/>
+ <fixed base="0.9.8" version="0.9.8n" date="20100324">
+ <git hash="cca1cd9a3447dd067503e4a85ebd1679ee78a48e"/>
+ </fixed>
<reported source="Todd Rinaldo, Tomas Hoger (Red Hat)"/>
<description>
A missing return value check flaw was discovered in OpenSSL, that could
More information about the openssl-commits
mailing list