Revision 03b04ddac162c7b7fa3c57eadccc5a583a00d291 authored by Emilia Kasper on 02 July 2014, 17:02:33 UTC, committed by Matt Caswell on 06 August 2014, 19:27:51 UTC
- Upon parsing, reject OIDs with invalid base-128 encoding. - Always NUL-terminate the destination buffer in OBJ_obj2txt printing function. CVE-2014-3508 Reviewed-by: Dr. Stephen Henson <steve@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
1 parent 88ae012
File | Mode | Size |
---|---|---|
HOWTO | ||
apps | ||
crypto | ||
ssl | ||
README | -rw-r--r-- | 598 bytes |
c-indentation.el | -rw-r--r-- | 1.6 KB |
fingerprints.txt | -rw-r--r-- | 2.8 KB |
openssl-shared.txt | -rw-r--r-- | 1.5 KB |
openssl.txt | -rw-r--r-- | 45.6 KB |
openssl_button.gif | -rw-r--r-- | 2.0 KB |
openssl_button.html | -rw-r--r-- | 239 bytes |
ssleay.txt | -rw-r--r-- | 276.5 KB |
standards.txt | -rw-r--r-- | 11.8 KB |

Computing file changes ...