Skip to content
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
Show all changes
61 commits
Select commit Hold shift + click to select a range
cbbe95e
net: introduce `Socket#connecting` property
indutny Apr 26, 2016
19fb134
doc: use Buffer.from() instead of new Buffer()
JacksonTian Apr 25, 2016
36207c6
doc: correctly document the behavior of ee.once().
lance Apr 25, 2016
11e7cc5
build: don't compile with -B
bnoordhuis Apr 26, 2016
7b9ae70
benchmark: Fix crash in net benchmarks
Apr 27, 2016
8956432
build: exclude tap files from tarballs
mscdex Apr 22, 2016
f6d7279
doc: update build instructions for OS X
Trott Apr 20, 2016
fdde369
crypto: fix error in deprecation message
Trott Apr 22, 2016
6d1606e
test,tools: adjust function argument alignment
Trott Apr 26, 2016
3f608b1
tools: lint for function argument alignment
Trott Apr 19, 2016
66903f6
tools: add tests for the doctool
iankronquist Apr 3, 2016
089362f
test,tools: limit lint tolerance of gc global
Trott Apr 21, 2016
7153f96
build: unbreak -prof, disable PIE on OS X
bnoordhuis Apr 28, 2016
e62c42b
tools: remove default parameters from lint rule
Trott Apr 27, 2016
fa9d82d
src: unify implementations of Utf8Value etc.
addaleax Apr 23, 2016
ab84d69
doc: better example & synopsis
Fishrock123 Apr 12, 2016
150dd36
doc: no Node.js(1)
Fishrock123 Apr 12, 2016
fc0fbf1
doc: subdivide TOC, add auxiliary links
Fishrock123 Apr 12, 2016
9f23cb2
tools: fix exit code when linting from CI
mscdex Apr 27, 2016
2c92a1f
events: pass the original listener added by once
davidtaikocha Apr 29, 2016
1b9fdba
process: add process.cpuUsage() - implementation, doc, tests
Apr 5, 2016
b3f75ec
doc: expand documentation for process.exit()
jasnell Apr 27, 2016
76c9ab5
assert: allow circular references
Trott Apr 27, 2016
fd37d54
doc: added note warning about change to console.endTime()
ben-page Apr 28, 2016
8eb87ee
doc: Remove extra space in REPL example
Apr 28, 2016
bfcde97
doc: fix incorrect syntax in examples
evanlucas Apr 29, 2016
4068d64
doc: fix EventEmitter#eventNames() example
ChALkeR Apr 27, 2016
0d19853
build: use shorthand lint target from test
jbergstroem Apr 27, 2016
e6c8da4
doc: make `writable.setDefaultEncoding()` return `this`
estliberitas Apr 30, 2016
4ae39f9
doc: remove all scrollbar styling
claudiorodriguez Apr 29, 2016
7034ebe
doc: use `Node.js` in synopsis document
Trott Apr 29, 2016
3d5b732
doc: clarifies http.serverResponse implementation
AllenSH12 Apr 6, 2016
13e6608
doc: extra clarification of historySize option
vsemozhetbyt Apr 26, 2016
ab7055b
doc: fix fs.realpath man pg links
phette23 Apr 28, 2016
969f96a
doc: fix a typo in __dirname section
toyota790 Apr 29, 2016
3e028a1
doc: remove obsolete comment in isError() example
cjihrig Apr 30, 2016
e5ce53a
doc: fix sentence fragment in fs doc
Trott Apr 30, 2016
457d12a
test: add failing url parse tests as known_issue
jasnell Mar 24, 2016
5fe5fa2
test: make addon testing part of `make test`
bnoordhuis Apr 15, 2016
2d503b1
debugger: display array contents in repl
cjihrig Apr 28, 2016
7641f9a
test: refactor large event emitter tests
cjihrig Apr 28, 2016
7c30f15
doc: ensure consistent grammar in node.1 file
justshiv Apr 27, 2016
08e0884
tools: add -F flag for fixing lint issues
Trott Apr 29, 2016
1330496
cluster: remove use of bind() in destroy()
yorkie May 1, 2016
d674493
doc: add missing underscore for markdown italics
May 2, 2016
0bca959
util: fix inspecting of proxy objects
jasnell Apr 29, 2016
9a29b50
doc: fix the lint of an example in cluster.md
yorkie May 2, 2016
4f728df
doc: linkify remaining references to fs.Stats object
Apr 30, 2016
33f24c8
doc: adds 'close' events to fs.ReadStream and fs.WriteStream
May 1, 2016
91ab769
util: truncate inspect array and typed array
jasnell Apr 21, 2016
65b6574
deps: backport IsValid changes from 4e8736d in V8
targos May 3, 2016
e6ab3ec
deps: upgrade openssl sources to 1.0.2h
May 3, 2016
3af28d3
deps: copy all openssl header files to include dir
May 3, 2016
d159462
deps: fix openssl assembly error on ia32 win32
indutny Jan 8, 2014
3fe6812
deps: fix asm build error of openssl in x86_win32
Feb 13, 2015
534f03c
openssl: fix keypress requirement in apps on win32
Feb 17, 2015
a5a2944
deps: add -no_rand_screen to openssl s_client
May 27, 2015
54f8600
deps: update openssl asm and asm_obsolete files
May 3, 2016
65030c7
test: fix alpn tests for openssl1.0.2h
May 3, 2016
cd7b76e
2016-05-05, Version 6.1.0 (Current)
Fishrock123 May 5, 2016
8aa8f18
Working on v6.1.1
Fishrock123 May 5, 2016
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
deps: upgrade openssl sources to 1.0.2h
This replaces all sources of openssl-1.0.2h.tar.gz into
deps/openssl/openssl

Fixes: #6458
PR-URL: #6550
Reviewed-By: Myles Borins <myles.borins@gmail.com>
Reviewed-By: Fedor Indutny <fedor.indutny@gmail.com>
Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
  • Loading branch information
Shigeki Ohtsu authored and Fishrock123 committed May 4, 2016
commit e6ab3ece65b06836a70f2a2b787dd95ef3c33268
97 changes: 97 additions & 0 deletions deps/openssl/openssl/CHANGES
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,103 @@
OpenSSL CHANGES
_______________

Changes between 1.0.2g and 1.0.2h [3 May 2016]

*) Prevent padding oracle in AES-NI CBC MAC check

A MITM attacker can use a padding oracle attack to decrypt traffic
when the connection uses an AES CBC cipher and the server support
AES-NI.

This issue was introduced as part of the fix for Lucky 13 padding
attack (CVE-2013-0169). The padding check was rewritten to be in
constant time by making sure that always the same bytes are read and
compared against either the MAC or padding bytes. But it no longer
checked that there was enough data to have both the MAC and padding
bytes.

This issue was reported by Juraj Somorovsky using TLS-Attacker.
(CVE-2016-2107)
[Kurt Roeckx]

*) Fix EVP_EncodeUpdate overflow

An overflow can occur in the EVP_EncodeUpdate() function which is used for
Base64 encoding of binary data. If an attacker is able to supply very large
amounts of input data then a length check can overflow resulting in a heap
corruption.

Internally to OpenSSL the EVP_EncodeUpdate() function is primarly used by
the PEM_write_bio* family of functions. These are mainly used within the
OpenSSL command line applications, so any application which processes data
from an untrusted source and outputs it as a PEM file should be considered
vulnerable to this issue. User applications that call these APIs directly
with large amounts of untrusted data may also be vulnerable.

This issue was reported by Guido Vranken.
(CVE-2016-2105)
[Matt Caswell]

*) Fix EVP_EncryptUpdate overflow

An overflow can occur in the EVP_EncryptUpdate() function. If an attacker
is able to supply very large amounts of input data after a previous call to
EVP_EncryptUpdate() with a partial block then a length check can overflow
resulting in a heap corruption. Following an analysis of all OpenSSL
internal usage of the EVP_EncryptUpdate() function all usage is one of two
forms. The first form is where the EVP_EncryptUpdate() call is known to be
the first called function after an EVP_EncryptInit(), and therefore that
specific call must be safe. The second form is where the length passed to
EVP_EncryptUpdate() can be seen from the code to be some small value and
therefore there is no possibility of an overflow. Since all instances are
one of these two forms, it is believed that there can be no overflows in
internal code due to this problem. It should be noted that
EVP_DecryptUpdate() can call EVP_EncryptUpdate() in certain code paths.
Also EVP_CipherUpdate() is a synonym for EVP_EncryptUpdate(). All instances
of these calls have also been analysed too and it is believed there are no
instances in internal usage where an overflow could occur.

This issue was reported by Guido Vranken.
(CVE-2016-2106)
[Matt Caswell]

*) Prevent ASN.1 BIO excessive memory allocation

When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio()
a short invalid encoding can casuse allocation of large amounts of memory
potentially consuming excessive resources or exhausting memory.

Any application parsing untrusted data through d2i BIO functions is
affected. The memory based functions such as d2i_X509() are *not* affected.
Since the memory based functions are used by the TLS library, TLS
applications are not affected.

This issue was reported by Brian Carpenter.
(CVE-2016-2109)
[Stephen Henson]

*) EBCDIC overread

ASN1 Strings that are over 1024 bytes can cause an overread in applications
using the X509_NAME_oneline() function on EBCDIC systems. This could result
in arbitrary stack data being returned in the buffer.

This issue was reported by Guido Vranken.
(CVE-2016-2176)
[Matt Caswell]

*) Modify behavior of ALPN to invoke callback after SNI/servername
callback, such that updates to the SSL_CTX affect ALPN.
[Todd Short]

*) Remove LOW from the DEFAULT cipher list. This removes singles DES from the
default.
[Kurt Roeckx]

*) Only remove the SSLv2 methods with the no-ssl2-method option. When the
methods are enabled and ssl2 is disabled the methods return NULL.
[Kurt Roeckx]

Changes between 1.0.2f and 1.0.2g [1 Mar 2016]

* Disable weak ciphers in SSLv3 and up in default builds of OpenSSL.
Expand Down
Loading