blob: 84041c841db41afb9fdfb85e9904805fe4e12cbf [file] [view]
# OpenSSL Advisory: Sept 26th 2016
OpenSSL have published a [security advisory](https://www.openssl.org/news/secadv/20160926.txt). Here's how it affects BoringSSL:
CVE | Summary | [Severity] in OpenSSL | Impact to BoringSSL
----|---------|-----------------------|---------------------
CVE-2016-6309 | Use After Free for large message sizes. | Critical | Not affected. The code in question was not included in BoringSSL. Well add a test anyway.
CVE-2016-7052 | Crash when using CRLs | High | Affected. Fix was imported. See discussion below.
[Severity]: https://openssl-library.org/policies/general/security-policy/index.html#issue-severity
## CVE-2016-7052
This bug causes a NULL pointer deref in some cases while processing a CRL. We imported the affected code in [e76cdde7](https://boringssl.googlesource.com/boringssl/+/e76cdde77d05e13c4743ce1b5fe102cb4dd30e03) (July 26th) so it has been in BoringSSL for some months. The fix was imported in [f9f312a](https://boringssl.googlesource.com/boringssl/+/f9f312af61f9ba87896736620d1e4e568c4442bd).