[openssl] master update

Dr. Paul Dale pauli at openssl.org
Wed May 26 07:58:05 UTC 2021


The branch master has been updated
       via  1ee04b791b396385cce2a0c46c112158b2005293 (commit)
      from  0221b080cefa7358c0a0737d089caeec2979f930 (commit)


- Log -----------------------------------------------------------------
commit 1ee04b791b396385cce2a0c46c112158b2005293
Author: Shane Lontis <shane.lontis at oracle.com>
Date:   Tue May 25 13:31:44 2021 +1000

    Fix buffer overflow when generating large RSA keys in FIPS mode.
    
    A pairwise test runs only in FIPS mode.
    An assumption about the size of the 'to' buffer passed to
    RSA_private_decrypt() was incorrect. It needs to be up to RSA_size()
    bytes long - so a fixed buffer of 256 bytes was not large enough.
    An exiting malloc has increased in size to allocate buffer space for
    both the encrypt and decrypt buffer.
    
    The existing test used 2080 bits which was not quite large enough to
    trigger the issue. A test using 3072 bits has been added.
    
    Reported by Mark Powers from Acumen.
    
    Reviewed-by: Tomas Mraz <tomas at openssl.org>
    Reviewed-by: Paul Dale <pauli at openssl.org>
    (Merged from https://github.com/openssl/openssl/pull/15447)

-----------------------------------------------------------------------

Summary of changes:
 crypto/rsa/rsa_gen.c          | 9 +++++++--
 test/recipes/15-test_genrsa.t | 8 +++++++-
 2 files changed, 14 insertions(+), 3 deletions(-)

diff --git a/crypto/rsa/rsa_gen.c b/crypto/rsa/rsa_gen.c
index 07a3a7800e..ac64483e6a 100644
--- a/crypto/rsa/rsa_gen.c
+++ b/crypto/rsa/rsa_gen.c
@@ -479,7 +479,7 @@ static int rsa_keygen_pairwise_test(RSA *rsa, OSSL_CALLBACK *cb, void *cbarg)
     unsigned int ciphertxt_len;
     unsigned char *ciphertxt = NULL;
     const unsigned char plaintxt[16] = {0};
-    unsigned char decoded[256];
+    unsigned char *decoded = NULL;
     unsigned int decoded_len;
     unsigned int plaintxt_len = (unsigned int)sizeof(plaintxt_len);
     int padding = RSA_PKCS1_PADDING;
@@ -492,9 +492,14 @@ static int rsa_keygen_pairwise_test(RSA *rsa, OSSL_CALLBACK *cb, void *cbarg)
                            OSSL_SELF_TEST_DESC_PCT_RSA_PKCS1);
 
     ciphertxt_len = RSA_size(rsa);
-    ciphertxt = OPENSSL_zalloc(ciphertxt_len);
+    /*
+     * RSA_private_encrypt() and RSA_private_decrypt() requires the 'to'
+     * parameter to be a maximum of RSA_size() - allocate space for both.
+     */
+    ciphertxt = OPENSSL_zalloc(ciphertxt_len * 2);
     if (ciphertxt == NULL)
         goto err;
+    decoded = ciphertxt + ciphertxt_len;
 
     ciphertxt_len = RSA_public_encrypt(plaintxt_len, plaintxt, ciphertxt, rsa,
                                        padding);
diff --git a/test/recipes/15-test_genrsa.t b/test/recipes/15-test_genrsa.t
index 95390c5ff4..501d3a100f 100644
--- a/test/recipes/15-test_genrsa.t
+++ b/test/recipes/15-test_genrsa.t
@@ -24,7 +24,7 @@ use lib bldtop_dir('.');
 my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0);
 
 plan tests =>
-    ($no_fips ? 0 : 1)          # Extra FIPS related test
+    ($no_fips ? 0 : 2)          # Extra FIPS related test
     + 13;
 
 # We want to know that an absurdly small number of bits isn't support
@@ -131,4 +131,10 @@ unless ($no_fips) {
                '-pkeyopt', 'bits:2080',
                '-out', 'genrsatest2080.pem'])),
        "Generating RSA key with > 2048 bits and < 3072 bits");
+    ok(run(app(['openssl', 'genpkey',
+                @prov,
+               '-algorithm', 'RSA',
+               '-pkeyopt', 'bits:3072',
+               '-out', 'genrsatest3072.pem'])),
+       "Generating RSA key with 3072 bits");
 }


More information about the openssl-commits mailing list