Lines Matching refs:overflow

274      could result in an integer overflow, causing a zero-length buffer to be
276 the buffer, causing a heap buffer overflow.
325 for overflow of the output buffer and reporting the actual length
447 which checks for overflow of the output buffer and reports the actual
466 * Fix a remotely exploitable heap buffer overflow in TLS handshake parsing.
693 * Fix possible integer overflow in mbedtls_timing_hardclock(), which
1235 non-compliant. This could not lead to a buffer overflow. In particular,
1978 * Fix a buffer overflow in mbedtls_mpi_sub_abs() when calculating
1989 * Fix a stack buffer overflow with mbedtls_net_poll() and
2292 previously could lead to stack overflow on constrained devices.
2384 output buffer overflow if the configuration declared a buffer that was
2591 * Fix a buffer overflow in the PSA HMAC code when using a long key with an
2805 * Fix 1-byte buffer overflow in mbedtls_mpi_write_string() when
2880 previously lead to a stack overflow on constrained targets.
2973 This could lead to a buffer overflow, but only in case ticket authentication
3567 overflow. #1179
3573 * Fix a possible arithmetic overflow in ssl_parse_server_key_exchange()
3575 * Fix a possible arithmetic overflow in ssl_parse_server_psk_hint() that
3579 * Fix a 1-byte heap buffer overflow (read-only) during private key parsing.
3602 * Fix a buffer overflow in RSA-PSS verification when the hash was too large
3606 * Fix buffer overflow in RSA-PSS verification when the unmasked data is all
3610 * Fix a potential heap buffer overflow in mbedtls_ssl_write(). When the (by
3843 * Fix a potential integer overflow in the version verification for DER
3844 encoded X.509 CRLs. The overflow could enable maliciously constructed CRLs
3847 * Fix potential integer overflow in the version verification for DER
3848 encoded X.509 CSRs. The overflow could enable maliciously constructed CSRs
3851 * Fix a potential integer overflow in the version verification for DER
3852 encoded X.509 certificates. The overflow could enable maliciously
3911 * Fix a numerical underflow leading to stack overflow in mpi_read_file()
4003 * Fixed potential arithmetic overflow in mbedtls_ctr_drbg_reseed() that could
4007 * Fixed potential arithmetic overflow in mbedtls_md2_update() that could
4009 * Fixed potential arithmetic overflow in mbedtls_base64_decode() that could
4022 * Fix 1 byte buffer overflow in mbedtls_mpi_write_string() when the MPI
4121 * Fix potential integer overflow to buffer overflow in
4199 * Fix potential buffer overflow in some asn1_write_xxx() functions.
4242 overflow of the hostname or session ticket. Found by Guido Vranken,
4248 * Fix stack buffer overflow in pkcs12 decryption (used by
4251 * Fix potential buffer overflow in mbedtls_mpi_read_string().
4260 * Fix possible heap buffer overflow in base64_encoded() when the input
4266 * Fix potential heap buffer overflow in servers that perform client
4647 * Fix potential stack overflow while parsing crafted X.509 certificates
4674 * Stack buffer overflow if ctr_drbg_update() is called with too large
4676 * Possible buffer overflow of length at most POLARSSL_MEMORY_ALIGN_MULTIPLE
4943 * Fixed possible buffer overflow with overlong PSK
5025 * Fixed potential overflow in certificate size verification in
5170 * Fix potential stack overflow while parsing crafted X.509 certificates
5179 * Stack buffer overflow if ctr_drbg_update() is called with too large
5261 * Fixed potential overflow in certificate size verification in
5316 * Fixed potential heap buffer overflow on large hostname setting
5523 * Potential buffer-overflow for ssl_read_record() (independently found by
5526 * Potential heap buffer overflow on large hostname setting
5950 * Fixed dangerous bug that can cause a heap overflow in