Matt Caswell 1d2a18dc5a Multiblock corrupted pointer fix
OpenSSL 1.0.2 introduced the "multiblock" performance improvement. This
feature only applies on 64 bit x86 architecture platforms that support AES
NI instructions. A defect in the implementation of "multiblock" can cause
OpenSSL's internal write buffer to become incorrectly set to NULL when
using non-blocking IO. Typically, when the user application is using a
socket BIO for writing, this will only result in a failed connection.
However if some other BIO is used then it is likely that a segmentation
fault will be triggered, thus enabling a potential DoS attack.

CVE-2015-0290

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Andy Polyakov <appro@openssl.org>
2015-03-19 11:11:02 +00:00
..
2015-02-06 10:52:12 -05:00
2015-03-09 10:51:57 +00:00
2015-02-06 10:52:12 -05:00
2015-02-06 10:52:12 -05:00
2015-02-26 23:27:09 +00:00
2015-02-27 20:29:03 +00:00
2012-07-05 13:20:19 +00:00
2015-02-06 10:52:12 -05:00
2015-01-22 09:20:09 +00:00
2015-01-12 10:28:05 -05:00
2015-01-27 12:34:45 -05:00
2015-03-11 10:40:44 +00:00
2015-03-15 12:15:08 +01:00
2015-03-19 11:11:02 +00:00
2015-02-06 10:52:12 -05:00
2015-02-06 10:52:12 -05:00
2015-01-22 09:20:09 +00:00
2015-01-22 09:20:09 +00:00
2015-01-22 09:20:09 +00:00
2015-03-15 12:15:08 +01:00
2015-03-15 12:15:08 +01:00
2015-03-15 12:15:08 +01:00
2015-03-15 12:15:08 +01:00
2015-03-15 12:15:08 +01:00
2015-01-30 14:43:57 +01:00
2015-03-17 13:39:53 +00:00
2015-01-28 15:37:16 -05:00
2015-03-12 09:25:32 +00:00
2015-02-06 10:52:12 -05:00