diff options
| author | tedu <> | 2016-05-04 15:05:13 +0000 |
|---|---|---|
| committer | tedu <> | 2016-05-04 15:05:13 +0000 |
| commit | 14ce935972dfee67affb9dbef7b76c66fc35423b (patch) | |
| tree | 61f82263a3f91407e4d8cbf798564a97aa9bdea3 /src/lib/libcrypto/evp/encode.c | |
| parent | f67a456a3757b6d60641164adc3e3a5bdfc8fa4d (diff) | |
| download | openbsd-14ce935972dfee67affb9dbef7b76c66fc35423b.tar.gz openbsd-14ce935972dfee67affb9dbef7b76c66fc35423b.tar.bz2 openbsd-14ce935972dfee67affb9dbef7b76c66fc35423b.zip | |
fix for integer overflow in encode and encrypt update functions.
additionally, in EncodeUpdate, if the amount written would overflow,
return 0 instead to prevent bugs in the caller.
CVE-2016-2105 and CVE-2016-2106 from openssl.
Diffstat (limited to 'src/lib/libcrypto/evp/encode.c')
| -rw-r--r-- | src/lib/libcrypto/evp/encode.c | 13 |
1 files changed, 9 insertions, 4 deletions
diff --git a/src/lib/libcrypto/evp/encode.c b/src/lib/libcrypto/evp/encode.c index 637870cef6..1097a7c903 100644 --- a/src/lib/libcrypto/evp/encode.c +++ b/src/lib/libcrypto/evp/encode.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: encode.c,v 1.23 2016/05/04 14:53:29 tedu Exp $ */ | 1 | /* $OpenBSD: encode.c,v 1.24 2016/05/04 15:05:13 tedu Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -125,13 +125,13 @@ EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl, | |||
| 125 | const unsigned char *in, int inl) | 125 | const unsigned char *in, int inl) |
| 126 | { | 126 | { |
| 127 | int i, j; | 127 | int i, j; |
| 128 | unsigned int total = 0; | 128 | size_t total = 0; |
| 129 | 129 | ||
| 130 | *outl = 0; | 130 | *outl = 0; |
| 131 | if (inl == 0) | 131 | if (inl == 0) |
| 132 | return; | 132 | return; |
| 133 | OPENSSL_assert(ctx->length <= (int)sizeof(ctx->enc_data)); | 133 | OPENSSL_assert(ctx->length <= (int)sizeof(ctx->enc_data)); |
| 134 | if ((ctx->num + inl) < ctx->length) { | 134 | if (ctx->length - ctx->num > inl) { |
| 135 | memcpy(&(ctx->enc_data[ctx->num]), in, inl); | 135 | memcpy(&(ctx->enc_data[ctx->num]), in, inl); |
| 136 | ctx->num += inl; | 136 | ctx->num += inl; |
| 137 | return; | 137 | return; |
| @@ -148,7 +148,7 @@ EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl, | |||
| 148 | *out = '\0'; | 148 | *out = '\0'; |
| 149 | total = j + 1; | 149 | total = j + 1; |
| 150 | } | 150 | } |
| 151 | while (inl >= ctx->length) { | 151 | while (inl >= ctx->length && total <= INT_MAX) { |
| 152 | j = EVP_EncodeBlock(out, in, ctx->length); | 152 | j = EVP_EncodeBlock(out, in, ctx->length); |
| 153 | in += ctx->length; | 153 | in += ctx->length; |
| 154 | inl -= ctx->length; | 154 | inl -= ctx->length; |
| @@ -157,6 +157,11 @@ EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl, | |||
| 157 | *out = '\0'; | 157 | *out = '\0'; |
| 158 | total += j + 1; | 158 | total += j + 1; |
| 159 | } | 159 | } |
| 160 | if (total > INT_MAX) { | ||
| 161 | /* Too much output data! */ | ||
| 162 | *outl = 0; | ||
| 163 | return; | ||
| 164 | } | ||
| 160 | if (inl != 0) | 165 | if (inl != 0) |
| 161 | memcpy(&(ctx->enc_data[0]), in, inl); | 166 | memcpy(&(ctx->enc_data[0]), in, inl); |
| 162 | ctx->num = inl; | 167 | ctx->num = inl; |
