[openssl-dev] proposal : let openssl users don’t assume int is equal to pointer size.
none
ytrezq at sdf-eu.org
Thu Apr 21 20:36:25 UTC 2016
Hello,
As you know, using signed int instead of size_t for size handling is a
common source of potential remote code execution…
Openssl have lot of functions that takes "int len" as a parameter. Of
course changing the api by using size_t would cause problems. So for the
functions that can returns errors like BIOS_read(), what about letting
the application that did a mistake know they did wrong (because of a
vulnerability) ?
I mean checking in Openssl that the given integers aren’t negative in
the concerned functions (taking the bio_read() example if len would be
negative -1 would be returned).
Existing applications normally already check the return value of such
function, so they have code to handle it.
Of course I can make such change (and in fact will finish to do it if
you agree with this)
More information about the openssl-dev
mailing list