Files
mbedtls/library
Hanno Becker c26741f8ca Prevent bounds check bypass through overflow in PSK identity parsing
The check `if( *p + n > end )` in `ssl_parse_client_psk_identity` is
unsafe because `*p + n` might overflow, thus bypassing the check. As
`n` is a user-specified value up to 65K, this is relevant if the
library happens to be located in the last 65K of virtual memory.

This commit replaces the check by a safe version.
2017-06-26 14:10:13 +01:00
..
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2015-10-05 11:41:36 +01:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2015-12-03 19:22:55 +01:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2016-01-08 14:52:14 +01:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2017-02-25 19:44:47 +00:00
2015-11-02 05:58:10 +09:00
2015-09-04 14:21:07 +02:00
2017-02-25 20:37:43 +00:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2015-09-28 19:47:50 +02:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2017-06-20 19:33:51 +01:00
2017-06-08 14:04:22 +01:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00