Skip to content
Projects
Groups
Snippets
Help
Loading...
Sign in / Register
Toggle navigation
C
capnproto
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Packages
Packages
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
submodule
capnproto
Commits
96635cc8
Commit
96635cc8
authored
Sep 04, 2015
by
Kenton Varda
Browse files
Options
Browse Files
Download
Plain Diff
Merge pull request #242 from jwilk/spelling
Fix typos.
parents
c09583d8
f29bb0da
Show whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
4 additions
and
4 deletions
+4
-4
2015-03-02-0-c++-integer-overflow.md
security-advisories/2015-03-02-0-c++-integer-overflow.md
+1
-1
2015-03-02-2-all-cpu-amplification.md
security-advisories/2015-03-02-2-all-cpu-amplification.md
+2
-2
2015-03-05-0-c++-addl-cpu-amplification.md
...ity-advisories/2015-03-05-0-c++-addl-cpu-amplification.md
+1
-1
No files found.
security-advisories/2015-03-02-0-c++-integer-overflow.md
View file @
96635cc8
...
...
@@ -91,7 +91,7 @@ following preventative measures going forward:
4.
We will continue to require that all tests (including the new fuzz test) run
cleanly under Valgrind before each release.
5.
We will commission a professional security review before any 1.0 release.
Until that time, we continue to recommend agai
sn
t using Cap'n Proto to
Until that time, we continue to recommend agai
ns
t using Cap'n Proto to
interpret data from potentially-malicious sources.
I am pleased that measures 1, 2, and 3 all detected this bug, suggesting that
...
...
security-advisories/2015-03-02-2-all-cpu-amplification.md
View file @
96635cc8
...
...
@@ -21,7 +21,7 @@ CVE-2015-2312
Impact
======
-
Remotely cause a peer to use excessive CPU time and other resou
cr
es to
-
Remotely cause a peer to use excessive CPU time and other resou
rc
es to
process a very small message, possibly enabling a DoS attack.
Fixed in
...
...
@@ -69,6 +69,6 @@ Preventative measures
=====================
This problem was discovered through fuzz testing using American Fuzzy Lop,
wich identified the problem as a "hang", although in fact the test case just
w
h
ich identified the problem as a "hang", although in fact the test case just
took a very long time to complete. We are incorporating testing with AFL into
our release process going forward.
security-advisories/2015-03-05-0-c++-addl-cpu-amplification.md
View file @
96635cc8
...
...
@@ -43,7 +43,7 @@ Details
=======
Advisory
[
2015-03-02-2
][
1
]
described a bug allowing a remote attacker to
consume excessive CPU time or other resources usin a specially-crafted message.
consume excessive CPU time or other resources usin
g
a specially-crafted message.
The present advisory is simply another case of the same bug which was initially
missed.
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment