Security fixes implemented: - CRIT-001: SSRF IPv6 bypass protection (localhost, link-local, ULA, mapped) - CRIT-002: cn_heavyZen3Memory leak fix with cleanup function - CRIT-003: HTTP header size DoS prevention (8KB/16KB limits) - CRIT-004: patchAsmVariants null check after allocation - CRIT-005: autoPause race condition fix with atomics - HIGH-001: OpenSSL strchr null pointer check - HIGH-002: uv_loop_close error handling - HIGH-004/005/006: Miner.cpp race conditions (atomic reset, mutex protection) - HIGH-007: m_workersMemory dangling pointer fix - HIGH-008: JIT buffer overflow bounds checking - HIGH-009: Bearer prefix timing attack mitigation - HIGH-010: CORS origin restriction to localhost - HIGH-011: Per-IP connection limits (10 per IP) for DoS protection - HIGH-012: SSRF 172.x RFC1918 range validation - MED-002: pthread_join return value check on macOS - MED-004: OclKawPowRunner exception-safe initialization - MED-005: Generic error messages to prevent info disclosure - MED-006: CRLF header injection prevention 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> |
||
|---|---|---|
| .. | ||
| config | ||
| core | ||
| cuda | ||
| deps | ||
| heatmap | ||
| proxy | ||
| workers | ||
| NOTICE | ||