mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-29 17:54:21 +01:00
Changed attribution for Guido Vranken
This commit is contained in:
parent
c047c74b95
commit
ac4461f783
28
ChangeLog
28
ChangeLog
@ -5,26 +5,26 @@ PolarSSL ChangeLog
|
||||
Security
|
||||
* Fix possible heap buffer overflow in SSL if a very long hostname is used.
|
||||
Can be trigerred remotely if you accept hostnames from untrusted parties.
|
||||
Found by Guido Vranken.
|
||||
Found by Guido Vranken, Intelworks.
|
||||
* Fix stack buffer overflow in pkcs12 decryption (used by
|
||||
mbedtls_pk_parse_key(file)() when the password is > 129 bytes.
|
||||
Found by Guido Vranken. Not triggerable remotely.
|
||||
mbedtls_pk_parse_key(file)() when the password is > 129 bytes. Found by
|
||||
Guido Vranken, Intelworks. Not triggerable remotely.
|
||||
* Fix potential buffer overflow in mbedtls_mpi_read_string().
|
||||
Found by Guido Vranken. Not exploitable remotely in the context of TLS,
|
||||
but might be in other uses. On 32 bit machines, requires reading a string
|
||||
of close to or larger than 1GB to exploit; on 64 bit machines, would require
|
||||
reading a string of close to or larger than 2^62 bytes.
|
||||
Found by Guido Vranken, Intelworks. Not exploitable remotely in the context
|
||||
of TLS, but might be in other uses. On 32 bit machines, requires reading a
|
||||
string of close to or larger than 1GB to exploit; on 64 bit machines, would
|
||||
require reading a string of close to or larger than 2^62 bytes.
|
||||
* Fix potential random memory allocation in mbedtls_pem_read_buffer()
|
||||
on crafted PEM input data. Found and fix provided by Guido Vranken.
|
||||
Not triggerable remotely in TLS. Triggerable remotely if you accept PEM
|
||||
data from an untrusted source.
|
||||
on crafted PEM input data. Found and fix provided by Guido Vranken,
|
||||
Intelworks. Not triggerable remotely in TLS. Triggerable remotely if you
|
||||
accept PEM data from an untrusted source.
|
||||
* Fix possible heap buffer overflow in base64_encode() when the input
|
||||
buffer is 512MB or larger on 32-bit platforms.
|
||||
Found by Guido Vranken. Not trigerrable remotely in TLS.
|
||||
buffer is 512MB or larger on 32-bit platforms. Found by Guido Vranken,
|
||||
Intelworks. Not trigerrable remotely in TLS.
|
||||
* Fix potential heap buffer overflow in servers that perform client
|
||||
authentication against a crafted CA cert. Cannot be triggered remotely
|
||||
unless you allow third parties to pick trust CAs for client auth.
|
||||
Found by Guido Vranken.
|
||||
unless you allow third parties to pick trust CAs for client auth. Found by
|
||||
Guido Vranken, Intelworks.
|
||||
|
||||
Changes
|
||||
* ssl_set_hostname() now rejects host names longer that 255 bytes (maximum
|
||||
|
Loading…
Reference in New Issue
Block a user