diff options
author | Matt Caswell <matt@openssl.org> | 2023-12-06 11:51:01 +0000 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2023-12-12 16:12:32 +0000 |
commit | 322517d817ecb5c1a3a8b0e7e038fa146857b4d4 (patch) | |
tree | 1e83e2f25e64dbf76797ae1030d99718718af562 /apps/errstr.c | |
parent | b83c719ecb884f609ade7ad7f52bd5e09737585b (diff) |
Fix some invalid use of sscanf
sscanf can return -1 on an empty input string. We need to appropriately
handle such an invalid case.
The instance in OSSL_HTTP_parse_url could cause an uninitialised read of
sizeof(unsigned int) bytes (typically 4). In many cases this uninit read
will immediately fail on the following check (i.e. if the read value
>65535).
If the top 2 bytes of a 4 byte unsigned int are zero then the value will
be <=65535 and the uninitialised value will be returned to the caller and
could represent arbitrary data on the application stack.
The OpenSSL security team has assessed this issue and consider it to be
a bug only (i.e. not a CVE).
Reviewed-by: Todd Short <todd.short@me.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/22961)
Diffstat (limited to 'apps/errstr.c')
-rw-r--r-- | apps/errstr.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/apps/errstr.c b/apps/errstr.c index 782705a78a..21349d21cb 100644 --- a/apps/errstr.c +++ b/apps/errstr.c @@ -62,7 +62,7 @@ int errstr_main(int argc, char **argv) /* All remaining arg are error code. */ ret = 0; for (argv = opt_rest(); *argv != NULL; argv++) { - if (sscanf(*argv, "%lx", &l) == 0) { + if (sscanf(*argv, "%lx", &l) <= 0) { ret++; } else { ERR_error_string_n(l, buf, sizeof(buf)); |