Reject invalid PSS parameters.
Fix a bug where invalid PSS parameters are not rejected resulting in a NULL pointer exception. This can be triggered during certificate verification so could be a DoS attack against a client or a server enabling client authentication. Thanks to Brian Carpenter for reporting this issues. CVE-2015-0208 Reviewed-by: Tim Hudson <tjh@openssl.org>
This commit is contained in:
parent
b717b08307
commit
4b22cce381
@ -698,9 +698,10 @@ static int rsa_item_verify(EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn,
|
|||||||
RSAerr(RSA_F_RSA_ITEM_VERIFY, RSA_R_UNSUPPORTED_SIGNATURE_TYPE);
|
RSAerr(RSA_F_RSA_ITEM_VERIFY, RSA_R_UNSUPPORTED_SIGNATURE_TYPE);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
if (rsa_pss_to_ctx(ctx, NULL, sigalg, pkey))
|
if (rsa_pss_to_ctx(ctx, NULL, sigalg, pkey) > 0) {
|
||||||
/* Carry on */
|
/* Carry on */
|
||||||
return 2;
|
return 2;
|
||||||
|
}
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user