diff options
author | tb <> | 2020-05-19 20:22:33 +0000 |
---|---|---|
committer | tb <> | 2020-05-19 20:22:33 +0000 |
commit | 6630841d9c05ae2888f729f453466c8e2f30014c (patch) | |
tree | 70bd00aac210ae3d3f3e3ab72981b3a2c8d8aaa2 /src/usr.sbin | |
parent | ebbf586e93785a640960378c27e16a631faf5dc7 (diff) | |
download | openbsd-6630841d9c05ae2888f729f453466c8e2f30014c.tar.gz openbsd-6630841d9c05ae2888f729f453466c8e2f30014c.tar.bz2 openbsd-6630841d9c05ae2888f729f453466c8e2f30014c.zip |
OpenBSD 6.7 errata 004 6.7/004_libssl.patch.siglibressl-v3.1.2
original commits:
CVSROOT: /cvs
Module name: src
Changes by: jsing@cvs.openbsd.org 2020/05/16 08:44:55
Modified files:
lib/libssl : tls13_client.c
Log message:
Ensure that a TLSv1.3 server has provided a certificate.
The RFC requires that a server always provide a certificate for
authentication. Ensure that this is the case, rather than proceeding and
attempting validation. In the case where validation was disabled and the
server returned an empty certificate list, this would have previously
resulted in a NULL pointer deference.
Issue reported by otto@
ok inoguchi@ tb@
CVSROOT: /cvs
Module name: src
Changes by: jsing@cvs.openbsd.org 2020/05/17 08:26:15
Modified files:
lib/libssl : tls13_client.c
Log message:
Send a decode error alert if a server provides an empty certificate list.
According to RFC 8446 section 4.4.2.4, a client receiving an empty
certificate list must abort the handshake with a decode error alert.
ok beck@ inoguchi@ tb@ ('it rarely is the alert you'd expect it to be...')
Diffstat (limited to 'src/usr.sbin')
0 files changed, 0 insertions, 0 deletions