upgrade base OpenSSL 1.0.1 to 1.0.2
Issue #140
resolved
T/O
Comments (3)
-
reporter -
reporter - Issue
gcc-4.5 does not like fileno() to be unchecked#141 - Issue
Coverity analysis warning(unchecked returm)#142 - Issue
ARMv7 Cryptographic accelerator runtime detection#143 - Issue
CVE-2018-0739 Constructed ASN.1 types with a recursive definition could exceed the stack#144 - Issue
BIO_get_accept_socket()'s IPv6 support is broken#145 - Issue
CVE-2017-3738 rsaz_1024_mul_avx2 overflow bug on x86_64#146 - Issue
CVE-2017-3736 bn_sqrx8x_internal carry bug on x86_64#147 - Issue
gcc -fstack-protector + alloca(3)#148 - Issue
Fix mips asm to not use outdated stuff.#149 - Issue
CVE-2007-3108 related ifdef#150 - Issue
define OPENSSL_DISABLE_OLD_DES_SUPPORT to drop des_old.h its obsoleted API.#151 - Issue
avoid DES_KEY_SZ/DES_SCHEDULE_SZ definition between des.h and openssl/des.h#152 - Issue
enable opencrypto(9)'s hardware cryptodev engine support#153 - Issue
#154PowerPC hardware AES accelarator support - Issue
#155enable hardware AES/GCM128 accelarator support on ARM - Issue
[N**BSD-PR/42881] openssl sha384 broken. Returns 64 bytes instead of 48#156 - Issue
#157integer type portability and backward compatibility - Issue
disable Hardware GCM128 accelaration Sparc 32bit#158 - Issue
#159build configuration on opensslconf.h - Issue
[N**BSD-PR/24458] openssl.cnf cannot correctly do variable substitution#160 - Issue
#161NEED_CPUID_SETUP macro - Issue
#162DONT_USE_SHA256_FROM_LIBC macro - Issue
OPENSSL_rdtsc() uses non-atomic ops under 32bit PowerPC#163 - Issue
use arc4random(was: use poll(2) instead of select(2) to read /dev/urandom).#164 - Issue
if RAND_file_name() cannot find .rnd(PRNG seed file), use /dev/urandom instead.#165 - Issue
CVE-2006-2940 openssl public key DoS#166 - Issue
CVE-2018-0737 RSA key generation cache timing vulnerability#167 - Issue
#168Sparc asm label fix - Issue
use native issetugid(3)#169 - Issue
CVE-2017-3735 Malformed X.509 IPAdressFamily could cause OOB read#170 - Issue
SSLv3 crash null pointer violation by unchecked buffer initialization#171 - Issue
NULL pointer dereference with SSL_MODE_RELEASE_BUFFERS flag#172 - Issue
CVE-2017-3737 Read/write after SSL object in error state#173 - Issue
#174use strl{cat,cpy}, snprintf instead of unsafe function. - Issue
rename free_func -> freefunc to avoid zlib.h namespace conflict.#175 - Issue
use <unistd.h> instead of OPENSSL_UNISTD macro#176 - Issue
#177cleanup all testcase - Issue
remove openss2n**bsd script (was: eliminate RCSID keyword)#178 - Issue
OPENSSL_API_COMPAT macro and sihm for OpenSSL-1.0.1 API.#179 - Issue
#182avoid to free illegal pointer
- Issue
-
reporter - changed status to resolved
merged latest OpenSSL-1_0_2-stable(1.0.2v-dev), done.
- Log in to comment
see tnozaki-openssl branch