1. 16 11月, 2016 7 次提交
  2. 14 11月, 2016 1 次提交
  3. 10 11月, 2016 5 次提交
  4. 09 11月, 2016 6 次提交
  5. 04 11月, 2016 4 次提交
  6. 02 11月, 2016 1 次提交
  7. 18 10月, 2016 1 次提交
  8. 03 10月, 2016 3 次提交
  9. 29 9月, 2016 4 次提交
  10. 28 9月, 2016 1 次提交
  11. 22 9月, 2016 2 次提交
    • M
      Fix a mem leak in NPN handling · c31dbed7
      Matt Caswell 提交于
      If a server sent multiple NPN extensions in a single ClientHello then a
      mem leak can occur. This will only happen where the client has requested
      NPN in the first place. It does not occur during renegotiation. Therefore
      the maximum that could be leaked in a single connection with a malicious
      server is 64k (the maximum size of the ServerHello extensions section). As
      this is client side, only occurs if NPN has been requested and does not
      occur during renegotiation this is unlikely to be exploitable.
      
      Issue reported by Shi Lei.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      c31dbed7
    • M
      Fix OCSP Status Request extension unbounded memory growth · e408c09b
      Matt Caswell 提交于
      A malicious client can send an excessively large OCSP Status Request
      extension. If that client continually requests renegotiation,
      sending a large OCSP Status Request extension each time, then there will
      be unbounded memory growth on the server. This will eventually lead to a
      Denial Of Service attack through memory exhaustion. Servers with a
      default configuration are vulnerable even if they do not support OCSP.
      Builds using the "no-ocsp" build time option are not affected.
      
      I have also checked other extensions to see if they suffer from a similar
      problem but I could not find any other issues.
      
      CVE-2016-6304
      
      Issue reported by Shi Lei.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      e408c09b
  12. 20 9月, 2016 3 次提交
  13. 14 9月, 2016 2 次提交