diff options
author | inoguchi <> | 2022-01-14 23:55:46 +0000 |
---|---|---|
committer | inoguchi <> | 2022-01-14 23:55:46 +0000 |
commit | 4681f1fa23cd9554370f01bf80dc21ea348dd551 (patch) | |
tree | 033ed9076d9786371759261ed6d2b66d6c5e43eb /src/lib/libcrypto/dsa | |
parent | c3859c4619d6925f8bcd2fd29e2681491ff60fc4 (diff) | |
download | openbsd-4681f1fa23cd9554370f01bf80dc21ea348dd551.tar.gz openbsd-4681f1fa23cd9554370f01bf80dc21ea348dd551.tar.bz2 openbsd-4681f1fa23cd9554370f01bf80dc21ea348dd551.zip |
Avoid buffer overflow in asn1_parse2
asn1_par.c r1.29 changed to access p[0] directly, and this pointer could be
overrun since ASN1_get_object advances pointer to the first content octet.
In case invalid ASN1 Boolean data, it has length but no content, I thought
this could be happen.
Adding check p with tot (diff below) will avoid this failure.
Reported by oss-fuzz 43633 and 43648(later)
ok tb@
Diffstat (limited to 'src/lib/libcrypto/dsa')
0 files changed, 0 insertions, 0 deletions