File tree 3 files changed +11
-1
lines changed
3 files changed +11
-1
lines changed Original file line number Diff line number Diff line change 4
4
5
5
Changes between 1.0.1e and 1.0.1f [xx XXX xxxx]
6
6
7
+ *) Fix for TLS record tampering bug. A carefully crafted invalid
8
+ handshake could crash OpenSSL with a NULL pointer exception.
9
+ Thanks to Anton Johansson for reporting this issues.
10
+ (CVE-2013-4353)
11
+
7
12
*) Keep original DTLS digest and encryption contexts in retransmission
8
13
structures so we can use the previous session parameters if they need
9
14
to be resent. (CVE-2013-6450)
Original file line number Diff line number Diff line change 7
7
8
8
Major changes between OpenSSL 1.0.1e and OpenSSL 1.0.1f [under development]
9
9
10
+ o Fix for TLS record tampering bug CVE-2013-4353
10
11
o Fix for TLS version checking bug CVE-2013-6449
11
12
o Fix for DTLS retransmission bug CVE-2013-6450
12
13
Original file line number Diff line number Diff line change @@ -210,7 +210,11 @@ static void ssl3_take_mac(SSL *s)
210
210
{
211
211
const char * sender ;
212
212
int slen ;
213
-
213
+ /* If no new cipher setup return immediately: other functions will
214
+ * set the appropriate error.
215
+ */
216
+ if (s -> s3 -> tmp .new_cipher == NULL )
217
+ return ;
214
218
if (s -> state & SSL_ST_CONNECT )
215
219
{
216
220
sender = s -> method -> ssl3_enc -> server_finished_label ;
You can’t perform that action at this time.
0 commit comments