1. 14 11月, 2016 1 次提交
  2. 10 11月, 2016 5 次提交
  3. 09 11月, 2016 6 次提交
  4. 04 11月, 2016 4 次提交
  5. 02 11月, 2016 1 次提交
  6. 18 10月, 2016 1 次提交
  7. 03 10月, 2016 3 次提交
  8. 29 9月, 2016 4 次提交
  9. 28 9月, 2016 1 次提交
  10. 22 9月, 2016 2 次提交
    • M
      Fix a mem leak in NPN handling · c31dbed7
      Matt Caswell 提交于
      If a server sent multiple NPN extensions in a single ClientHello then a
      mem leak can occur. This will only happen where the client has requested
      NPN in the first place. It does not occur during renegotiation. Therefore
      the maximum that could be leaked in a single connection with a malicious
      server is 64k (the maximum size of the ServerHello extensions section). As
      this is client side, only occurs if NPN has been requested and does not
      occur during renegotiation this is unlikely to be exploitable.
      
      Issue reported by Shi Lei.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      c31dbed7
    • M
      Fix OCSP Status Request extension unbounded memory growth · e408c09b
      Matt Caswell 提交于
      A malicious client can send an excessively large OCSP Status Request
      extension. If that client continually requests renegotiation,
      sending a large OCSP Status Request extension each time, then there will
      be unbounded memory growth on the server. This will eventually lead to a
      Denial Of Service attack through memory exhaustion. Servers with a
      default configuration are vulnerable even if they do not support OCSP.
      Builds using the "no-ocsp" build time option are not affected.
      
      I have also checked other extensions to see if they suffer from a similar
      problem but I could not find any other issues.
      
      CVE-2016-6304
      
      Issue reported by Shi Lei.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      e408c09b
  11. 20 9月, 2016 3 次提交
  12. 14 9月, 2016 2 次提交
  13. 13 9月, 2016 6 次提交
  14. 24 8月, 2016 1 次提交
    • D
      Sanity check ticket length. · e97763c9
      Dr. Stephen Henson 提交于
      If a ticket callback changes the HMAC digest to SHA512 the existing
      sanity checks are not sufficient and an attacker could perform a DoS
      attack with a malformed ticket. Add additional checks based on
      HMAC size.
      
      Thanks to Shi Lei for reporting this bug.
      
      CVE-2016-6302
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      e97763c9