Skip to content
  1. Apr 03, 2018
  2. Mar 28, 2018
  3. Mar 27, 2018
  4. Mar 26, 2018
  5. Mar 25, 2018
  6. Mar 21, 2018
  7. Mar 20, 2018
  8. Mar 15, 2018
  9. Mar 14, 2018
  10. Mar 12, 2018
  11. Mar 11, 2018
  12. Mar 08, 2018
  13. Mar 07, 2018
  14. Mar 05, 2018
  15. Mar 04, 2018
  16. Mar 03, 2018
  17. Mar 02, 2018
  18. Mar 01, 2018
  19. Feb 26, 2018
    • Dr. Matthias St. Pierre's avatar
      bio_b64.c: prevent base64 filter BIO from decoding out-of-bound data · b3f9b401
      Dr. Matthias St. Pierre authored
      Fixes #5405, #1381
      
      The base64 filter BIO reads its input in chunks of B64_BLOCK_SIZE bytes.
      When processing input in PEM format it can happen in rare cases that
      
      - the trailing PEM marker crosses the boundary of a chunk, and
      - the beginning of the following chunk contains valid base64 encoded data.
      
      This happened in issue #5405, where the PEM marker was split into
      "-----END CER" and "TIFICATE-----" at the end of the first chunk.
      
      The decoding of the first chunk terminated correctly at the '-' character,
      which is treated as an EOF marker, and b64_read() returned. However,
      when called the second time, b64_read() read the next chunk and interpreted
      the string "TIFICATE" as valid base64 encoded data, adding 6 extra bytes
      '4c 81 48 08 04 c4'.
      
      This patch restores the assignment of the error code to 'ctx->cont', which
      was deleted accidentally in commit 5562cfac
      
       and which prevents b64_read()
      from reading additional data on subsequent calls.
      
      This issue was observed and reported by Annie Yousar.
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/5422)
      b3f9b401
  20. Feb 22, 2018
  21. Feb 21, 2018