[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

Matt Caswell matt at openssl.org
Wed Feb 21 11:29:03 UTC 2018


The branch OpenSSL_1_0_2-stable has been updated
       via  cb7503750efc02c64cdb7167dee692e47c44c6e9 (commit)
      from  773da093b1b9a63ae9c94cae756848011686caa0 (commit)


- Log -----------------------------------------------------------------
commit cb7503750efc02c64cdb7167dee692e47c44c6e9
Author: Matt Caswell <matt at openssl.org>
Date:   Tue Feb 20 10:20:20 2018 +0000

    Sanity check the ticket length before using key name/IV
    
    This could in theory result in an overread - but due to the over allocation
    of the underlying buffer does not represent a security issue.
    
    Thanks to Fedor Indutny for reporting this issue.
    
    Reviewed-by: Rich Salz <rsalz at openssl.org>
    (Merged from https://github.com/openssl/openssl/pull/5417)

-----------------------------------------------------------------------

Summary of changes:
 ssl/t1_lib.c | 4 ++++
 1 file changed, 4 insertions(+)

diff --git a/ssl/t1_lib.c b/ssl/t1_lib.c
index 82ad601..a186623 100644
--- a/ssl/t1_lib.c
+++ b/ssl/t1_lib.c
@@ -3505,6 +3505,10 @@ static int tls_decrypt_ticket(SSL *s, const unsigned char *etick,
     EVP_CIPHER_CTX ctx;
     SSL_CTX *tctx = s->initial_ctx;
 
+    /* Need at least keyname + iv */
+    if (eticklen < 16 + EVP_MAX_IV_LENGTH)
+        return 2;
+
     /* Initialize session ticket encryption and HMAC contexts */
     HMAC_CTX_init(&hctx);
     EVP_CIPHER_CTX_init(&ctx);


More information about the openssl-commits mailing list