mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2025-01-27 14:11:13 +00:00
Merge branch 'iotssl-1368-unsafe-bounds-check-psk-identity-merge-1.3' into mbedtls-1.3-restricted
This commit is contained in:
commit
1dc344373a
|
@ -8,6 +8,8 @@ Security
|
||||||
Security Initiative, Qualcomm Technologies Inc.
|
Security Initiative, Qualcomm Technologies Inc.
|
||||||
* Fix buffer overflow in RSA-PSS verification when the unmasked
|
* Fix buffer overflow in RSA-PSS verification when the unmasked
|
||||||
data is all zeros.
|
data is all zeros.
|
||||||
|
* Fix unsafe bounds check in ssl_parse_client_psk_identity() when adding
|
||||||
|
64kB to the address of the SSL buffer wraps around.
|
||||||
|
|
||||||
Bugfix
|
Bugfix
|
||||||
* Fix memory leak in ssl_set_hostname() when called multiple times.
|
* Fix memory leak in ssl_set_hostname() when called multiple times.
|
||||||
|
|
|
@ -3141,7 +3141,7 @@ static int ssl_parse_client_psk_identity( ssl_context *ssl, unsigned char **p,
|
||||||
/*
|
/*
|
||||||
* Receive client pre-shared key identity name
|
* Receive client pre-shared key identity name
|
||||||
*/
|
*/
|
||||||
if( *p + 2 > end )
|
if( end - *p < 2 )
|
||||||
{
|
{
|
||||||
SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) );
|
SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) );
|
||||||
return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE );
|
return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE );
|
||||||
|
@ -3150,7 +3150,7 @@ static int ssl_parse_client_psk_identity( ssl_context *ssl, unsigned char **p,
|
||||||
n = ( (*p)[0] << 8 ) | (*p)[1];
|
n = ( (*p)[0] << 8 ) | (*p)[1];
|
||||||
*p += 2;
|
*p += 2;
|
||||||
|
|
||||||
if( n < 1 || n > 65535 || *p + n > end )
|
if( n < 1 || n > 65535 || n > (size_t) ( end - *p ) )
|
||||||
{
|
{
|
||||||
SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) );
|
SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) );
|
||||||
return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE );
|
return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE );
|
||||||
|
|
Loading…
Reference in a new issue