Gilles Peskine c8df898204 Fix buffer overflow in TLS 1.2 ClientKeyExchange parsing
Fix a buffer overflow in TLS 1.2 ClientKeyExchange parsing. When
MBEDTLS_USE_PSA_CRYPTO is enabled, the length of the public key in an ECDH
or ECDHE key exchange was not validated. This could result in an overflow of
handshake->xxdh_psa_peerkey, overwriting further data in the handshake
structure or further on the heap.

Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2023-10-02 15:02:33 +02:00
..
2023-08-23 17:15:34 +08:00
2023-08-28 10:58:24 +08:00
2023-08-28 10:58:24 +08:00
2023-07-11 14:06:37 +01:00
2023-01-11 14:50:10 +01:00
2023-09-15 18:30:09 +01:00
2023-01-23 19:10:26 +01:00
2023-08-17 14:36:59 +01:00
2023-01-11 14:50:10 +01:00
2023-01-11 14:50:10 +01:00
2023-09-18 19:09:45 +01:00
2023-06-24 13:37:28 +01:00
2023-09-05 18:15:31 +01:00
2023-01-11 14:50:10 +01:00
2023-04-12 06:07:23 +00:00
2023-08-01 22:41:17 +08:00
2023-08-02 10:32:21 +01:00
2023-03-24 10:43:40 +01:00
2023-01-11 14:50:10 +01:00
2023-09-12 19:18:17 +02:00
2023-01-11 14:50:10 +01:00
2023-01-11 14:50:10 +01:00
2023-09-22 10:01:47 +01:00
2023-07-27 15:46:05 +01:00
2023-08-28 10:58:24 +08:00
2023-07-06 12:42:33 +02:00
2023-03-13 12:15:49 +00:00
2023-01-11 14:50:10 +01:00
2023-01-11 14:50:10 +01:00
2023-01-11 14:50:10 +01:00
2023-06-26 11:11:23 +01:00
2023-01-11 14:50:10 +01:00
2023-01-11 14:50:10 +01:00
2023-01-11 14:50:10 +01:00
2023-01-11 14:50:10 +01:00
2023-09-22 10:01:47 +01:00
2023-01-11 14:50:10 +01:00
2023-01-11 14:50:10 +01:00
2023-01-11 14:50:10 +01:00
2023-01-11 14:50:10 +01:00
2023-09-05 16:53:33 +01:00