summaryrefslogtreecommitdiff
path: root/src/usr.bin
diff options
context:
space:
mode:
authorjsing <>2014-05-03 16:54:48 +0000
committerjsing <>2014-05-03 16:54:48 +0000
commit514338c77dd677946d110257af15041ce31eb6d0 (patch)
tree48c09265d52171990bb9e1d8b24d43333c3427cb /src/usr.bin
parent15fbf8f546dc0fe5cb255e4cdcd53ea50d1bd327 (diff)
downloadopenbsd-514338c77dd677946d110257af15041ce31eb6d0.tar.gz
openbsd-514338c77dd677946d110257af15041ce31eb6d0.tar.bz2
openbsd-514338c77dd677946d110257af15041ce31eb6d0.zip
Add checks for invalid base64 encoded data, specifically relating to the
handling of padding. This fixes a crash that can be triggered by feeding base64 data followed by 64 or more padding characters, which results in a negative output length. This issue was reported by David Ramos, although the same bug has been sitting in the OpenSSL RT since 2011: https://rt.openssl.org/Ticket/Display.html?id=2608 Worse still, BIO_read seems to be completely unable to detect that the base64 input was invalid/corrupt - in particular, enabling BIO_FLAGS_BASE64_NO_NL results in a stream of zero value bytes rather than no input (possibly a good replacement for /dev/null...), which could result in nasty consequences. Prior to this fix some zero value bytes were also injected without this flag being enabled. The recently added base64 regress triggers and documents these issues (and also ensures that this change retains functional behaviour).
Diffstat (limited to 'src/usr.bin')
0 files changed, 0 insertions, 0 deletions