mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2025-01-09 03:05:33 +00:00
Correct buffer size check
Further in the code the next field from the binary buffer is read. The check contained an off by one error.
This commit is contained in:
parent
225684015d
commit
f8ba5cf8e9
|
@ -2459,7 +2459,17 @@ static int ssl_parse_certificate_request( mbedtls_ssl_context *ssl )
|
|||
cert_type_len = buf[mbedtls_ssl_hs_hdr_len( ssl )];
|
||||
n = cert_type_len;
|
||||
|
||||
if( ssl->in_hslen < mbedtls_ssl_hs_hdr_len( ssl ) + 2 + n )
|
||||
/*
|
||||
* In the subsequent code there are two paths that make read from buf:
|
||||
* * the length of the signature algorithms field (if minor version of
|
||||
* SSL is 3),
|
||||
* * distinguished name length otherwise.
|
||||
* Both reach at most the index:
|
||||
* ...hdr_len + 2 + n,
|
||||
* therefore the buffer length at this point must be greater than that
|
||||
* regardless of the actual code path.
|
||||
*/
|
||||
if( ssl->in_hslen <= mbedtls_ssl_hs_hdr_len( ssl ) + 2 + n )
|
||||
{
|
||||
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate request message" ) );
|
||||
return( MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE_REQUEST );
|
||||
|
|
Loading…
Reference in a new issue