aboutsummaryrefslogtreecommitdiffstats
path: root/package/libs/openssl/patches
Commit message (Collapse)AuthorAgeFilesLines
* BB: openssl: update to 1.0.2f (fixes CVE-2016-0701, CVE-2015-3197)barrier_breakerJo-Philipp Wich2016-01-295-18/+18
| | | | | | | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org> Signed-off-by: Jo-Philipp Wich <jow@openwrt.org> Backport of r48531. git-svn-id: svn://svn.openwrt.org/openwrt/branches/barrier_breaker@48549 3c298f89-4303-0410-b956-a3cf2f4a3e73
* BB: openssl: update to v1.0.2e (CVE-2015-3193, CVE-2015-3194, CVE-2015-3195)Jo-Philipp Wich2015-12-075-13/+13
| | | | | | | | Signed-off-by: Jo-Philipp Wich <jow@openwrt.org> Backport of r47726. git-svn-id: svn://svn.openwrt.org/openwrt/branches/barrier_breaker@47804 3c298f89-4303-0410-b956-a3cf2f4a3e73
* BB: openssl: update to v1.0.2d (CVE-2015-1793)Jo-Philipp Wich2015-07-094-27/+22
| | | | | | | | | | | | | | | | | | During certificate verification, OpenSSL (starting from version 1.0.1n and 1.0.2b) will attempt to find an alternative certificate chain if the first attempt to build such a chain fails. An error in the implementation of this logic can mean that an attacker could cause certain checks on untrusted certificates to be bypassed, such as the CA flag, enabling them to use a valid leaf certificate to act as a CA and "issue" an invalid certificate. This issue will impact any application that verifies certificates including SSL/TLS/DTLS clients and SSL/TLS/DTLS servers using client authentication. Signed-off-by: Jo-Philipp Wich <jow@openwrt.org> Backport of r46285 git-svn-id: svn://svn.openwrt.org/openwrt/branches/barrier_breaker@46287 3c298f89-4303-0410-b956-a3cf2f4a3e73
* openssl: bump to 1.0.2cSteven Barth2015-06-126-30/+16
| | | | | | | | fixes CVE-2015-4000 CVE-2015-1788 CVE-2015-1789 CVE-2015-1790 CVE-2015-1792 CVE-2015-1791 Signed-off-by: Steven Barth <steven@midlink.org> git-svn-id: svn://svn.openwrt.org/openwrt/branches/barrier_breaker@45951 3c298f89-4303-0410-b956-a3cf2f4a3e73
* BB: openssl: update to v1.0.2a (14 CVEs)Jo-Philipp Wich2015-03-234-171/+17
| | | | | | | | | | Fixes CVE-2015-0204, CVE-2015-0207, CVE-2015-0208, CVE-2015-0209, CVE-2015-0285, CVE-2015-0286, CVE-2015-0287, CVE-2015-0288, CVE-2015-0289, CVE-2015-0290, CVE-2015-0291, CVE-2015-0292, CVE-2015-0293, CVE-2015-1787. Signed-off-by: Jo-Philipp Wich <jow@openwrt.org> git-svn-id: svn://svn.openwrt.org/openwrt/branches/barrier_breaker@44952 3c298f89-4303-0410-b956-a3cf2f4a3e73
* openssl: fix upstream regression for non-ec buildsSteven Barth2015-02-091-0/+14
| | | | | | Signed-off-by: Steven Barth <steven@midlink.org> git-svn-id: svn://svn.openwrt.org/openwrt/branches/barrier_breaker@44365 3c298f89-4303-0410-b956-a3cf2f4a3e73
* openssl: bump to 1.0.2Steven Barth2015-02-098-27/+27
| | | | | | | | Fixes CVE-2014-3513, CVE-2014-3567, CVE-2014-3568, CVE-2014-3566 Signed-off-by: Steven Barth <steven@midlink.org> git-svn-id: svn://svn.openwrt.org/openwrt/branches/barrier_breaker@44347 3c298f89-4303-0410-b956-a3cf2f4a3e73
* BB: openssl: update to v1.0.1k (8 CVEs)Jo-Philipp Wich2015-01-092-13/+13
| | | | | | | | | Fixes CVE-2014-3571, CVE-2015-0206, CVE-2014-3569, CVE-2014-3572, CVE-2015-0204, CVE-2015-0205, CVE-2014-8275 and CVE-2014-3570. Signed-off-by: Jo-Philipp Wich <jow@openwrt.org> git-svn-id: svn://svn.openwrt.org/openwrt/branches/barrier_breaker@43889 3c298f89-4303-0410-b956-a3cf2f4a3e73
* BB: openssl: update to v1.0.1j (CVE-2014-3513, CVE-2014-3567, CVE-2014-3568)Jo-Philipp Wich2014-10-162-10/+10
| | | | | | | | | | Also refresh patches and bump copyright year in Makefile. Signed-off-by: Jo-Philipp Wich <jow@openwrt.org> Backport of r42929 git-svn-id: svn://svn.openwrt.org/openwrt/branches/barrier_breaker@42930 3c298f89-4303-0410-b956-a3cf2f4a3e73
* openssl: update to 1.0.1fFelix Fietkau2014-03-096-44/+13
| | | | | | | | | | | | | This version includes this changes: Don't include gmt_unix_time in TLS server and client random values Fix for TLS record tampering bug CVE-2013-4353 Fix for TLS version checking bug CVE-2013-6449 Fix for DTLS retransmission bug CVE-2013-6450 Signed-off-by: Peter Wagner <tripolar@gmx.at> git-svn-id: svn://svn.openwrt.org/openwrt/trunk@39853 3c298f89-4303-0410-b956-a3cf2f4a3e73
* openssl: use termios instead of termioFelix Fietkau2014-02-242-2/+13
| | | | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org> git-svn-id: svn://svn.openwrt.org/openwrt/trunk@39748 3c298f89-4303-0410-b956-a3cf2f4a3e73
* openssl: add parallel build supportFelix Fietkau2013-09-101-0/+334
| | | | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org> git-svn-id: svn://svn.openwrt.org/openwrt/trunk@37927 3c298f89-4303-0410-b956-a3cf2f4a3e73
* openssl: remove now obsolete cris/etrax patchFlorian Fainelli2013-02-191-13/+0
| | | | | | | | The etrax target has been removed in r34768. Signed-off-by: Florian Fainelli <florian@openwrt.org> git-svn-id: svn://svn.openwrt.org/openwrt/trunk@35684 3c298f89-4303-0410-b956-a3cf2f4a3e73
* openssl: update OpenSSL to 1.0.1e, fix Cisco DTLS.Florian Fainelli2013-02-141-0/+31
| | | | | | | | | | | | | | | | 1.0.1d had a rushed fix for CVE-2013-0169 which broke in certain circumstances. 1.0.1e has the fix for TLS. Also include a further patch from the 1.0.1 branch which fixes the breakage this introduced for Cisco's outdated pre-standard version of DTLS, as used by OpenConnect. Update mirror URLs to reflect current reality. Signed-off-by: David Woodhouse <David.Woodhouse@intel.com> Signed-off-by: Florian Fainelli <florian@openwrt.org> git-svn-id: svn://svn.openwrt.org/openwrt/trunk@35600 3c298f89-4303-0410-b956-a3cf2f4a3e73
* openssl: security update to 1.0.1d to address CBC TLS issueTim Yardley2013-02-085-77/+13
| | | | | | | | | | | addressing CVE-2013-0169: 4th February 2013 Signed-off-by: Tim Yardley <yardley@gmail.com> git-svn-id: svn://svn.openwrt.org/openwrt/trunk@35524 3c298f89-4303-0410-b956-a3cf2f4a3e73
* move library packages to package/libs/Felix Fietkau2012-10-0810-0/+353
git-svn-id: svn://svn.openwrt.org/openwrt/trunk@33657 3c298f89-4303-0410-b956-a3cf2f4a3e73