Skip to content
  1. Aug 19, 2016
  2. Aug 18, 2016
  3. Aug 16, 2016
  4. Aug 15, 2016
  5. Aug 11, 2016
  6. Aug 05, 2016
  7. Aug 04, 2016
  8. Aug 03, 2016
  9. Aug 02, 2016
  10. Jul 29, 2016
  11. Jul 28, 2016
  12. Jul 26, 2016
  13. Jul 22, 2016
  14. Jul 20, 2016
  15. Jul 19, 2016
  16. Jul 18, 2016
  17. Jul 16, 2016
  18. Jul 15, 2016
  19. Jul 08, 2016
  20. Jul 06, 2016
  21. Jul 05, 2016
  22. Jul 01, 2016
    • Matt Caswell's avatar
      Avoid an overflow in constructing the ServerKeyExchange message · 77857ddc
      Matt Caswell authored
      
      
      We calculate the size required for the ServerKeyExchange message and then
      call BUF_MEM_grow_clean() on the buffer. However we fail to take account of
      2 bytes required for the signature algorithm and 2 bytes for the signature
      length, i.e. we could overflow by 4 bytes. In reality this won't happen
      because the buffer is pre-allocated to a large size that means it should be
      big enough anyway.
      
      Addresses an OCAP Audit issue.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      77857ddc