Lines Matching refs:overflow

94    * Fix a stack buffer overflow in mbedtls_ecdsa_der_to_raw() and
469 could result in an integer overflow, causing a zero-length buffer to be
471 the buffer, causing a heap buffer overflow.
520 for overflow of the output buffer and reporting the actual length
642 which checks for overflow of the output buffer and reports the actual
661 * Fix a remotely exploitable heap buffer overflow in TLS handshake parsing.
888 * Fix possible integer overflow in mbedtls_timing_hardclock(), which
1430 non-compliant. This could not lead to a buffer overflow. In particular,
2173 * Fix a buffer overflow in mbedtls_mpi_sub_abs() when calculating
2184 * Fix a stack buffer overflow with mbedtls_net_poll() and
2487 previously could lead to stack overflow on constrained devices.
2579 output buffer overflow if the configuration declared a buffer that was
2786 * Fix a buffer overflow in the PSA HMAC code when using a long key with an
3000 * Fix 1-byte buffer overflow in mbedtls_mpi_write_string() when
3075 previously lead to a stack overflow on constrained targets.
3168 This could lead to a buffer overflow, but only in case ticket authentication
3762 overflow. #1179
3768 * Fix a possible arithmetic overflow in ssl_parse_server_key_exchange()
3770 * Fix a possible arithmetic overflow in ssl_parse_server_psk_hint() that
3774 * Fix a 1-byte heap buffer overflow (read-only) during private key parsing.
3797 * Fix a buffer overflow in RSA-PSS verification when the hash was too large
3801 * Fix buffer overflow in RSA-PSS verification when the unmasked data is all
3805 * Fix a potential heap buffer overflow in mbedtls_ssl_write(). When the (by
4038 * Fix a potential integer overflow in the version verification for DER
4039 encoded X.509 CRLs. The overflow could enable maliciously constructed CRLs
4042 * Fix potential integer overflow in the version verification for DER
4043 encoded X.509 CSRs. The overflow could enable maliciously constructed CSRs
4046 * Fix a potential integer overflow in the version verification for DER
4047 encoded X.509 certificates. The overflow could enable maliciously
4106 * Fix a numerical underflow leading to stack overflow in mpi_read_file()
4198 * Fixed potential arithmetic overflow in mbedtls_ctr_drbg_reseed() that could
4202 * Fixed potential arithmetic overflow in mbedtls_md2_update() that could
4204 * Fixed potential arithmetic overflow in mbedtls_base64_decode() that could
4217 * Fix 1 byte buffer overflow in mbedtls_mpi_write_string() when the MPI
4316 * Fix potential integer overflow to buffer overflow in
4394 * Fix potential buffer overflow in some asn1_write_xxx() functions.
4437 overflow of the hostname or session ticket. Found by Guido Vranken,
4443 * Fix stack buffer overflow in pkcs12 decryption (used by
4446 * Fix potential buffer overflow in mbedtls_mpi_read_string().
4455 * Fix possible heap buffer overflow in base64_encoded() when the input
4461 * Fix potential heap buffer overflow in servers that perform client
4842 * Fix potential stack overflow while parsing crafted X.509 certificates
4869 * Stack buffer overflow if ctr_drbg_update() is called with too large
4871 * Possible buffer overflow of length at most POLARSSL_MEMORY_ALIGN_MULTIPLE
5138 * Fixed possible buffer overflow with overlong PSK
5220 * Fixed potential overflow in certificate size verification in
5365 * Fix potential stack overflow while parsing crafted X.509 certificates
5374 * Stack buffer overflow if ctr_drbg_update() is called with too large
5456 * Fixed potential overflow in certificate size verification in
5511 * Fixed potential heap buffer overflow on large hostname setting
5718 * Potential buffer-overflow for ssl_read_record() (independently found by
5721 * Potential heap buffer overflow on large hostname setting
6145 * Fixed dangerous bug that can cause a heap overflow in