1. 22 7月, 2016 1 次提交
  2. 20 7月, 2016 3 次提交
  3. 19 7月, 2016 27 次提交
  4. 18 7月, 2016 6 次提交
  5. 15 7月, 2016 1 次提交
  6. 13 7月, 2016 1 次提交
  7. 02 7月, 2016 1 次提交
    • M
      Avoid an overflow in constructing the ServerKeyExchange message · 1e16987f
      Matt Caswell 提交于
      We calculate the size required for the ServerKeyExchange message and then
      call BUF_MEM_grow_clean() on the buffer. However we fail to take account of
      2 bytes required for the signature algorithm and 2 bytes for the signature
      length, i.e. we could overflow by 4 bytes. In reality this won't happen
      because the buffer is pre-allocated to a large size that means it should be
      big enough anyway.
      
      Addresses an OCAP Audit issue.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      1e16987f