diff options
author | Dr. Stephen Henson <steve@openssl.org> | 2015-10-02 12:35:19 +0100 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2015-12-03 14:32:05 +0000 |
commit | c394a488942387246653833359a5c94b5832674e (patch) | |
tree | 5db97698a22d6e6c4753236e1311d067c18a93a9 /crypto/rsa | |
parent | d73cc256c8e256c32ed959456101b73ba9842f72 (diff) |
Add PSS parameter check.
Avoid seg fault by checking mgf1 parameter is not NULL. This can be
triggered during certificate verification so could be a DoS attack
against a client or a server enabling client authentication.
Thanks to Loïc Jonas Etienne (Qnective AG) for discovering this bug.
CVE-2015-3194
Reviewed-by: Richard Levitte <levitte@openssl.org>
Diffstat (limited to 'crypto/rsa')
-rw-r--r-- | crypto/rsa/rsa_ameth.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/crypto/rsa/rsa_ameth.c b/crypto/rsa/rsa_ameth.c index ca3922e6c2..4e0621827c 100644 --- a/crypto/rsa/rsa_ameth.c +++ b/crypto/rsa/rsa_ameth.c @@ -268,7 +268,7 @@ static X509_ALGOR *rsa_mgf1_decode(X509_ALGOR *alg) { const unsigned char *p; int plen; - if (alg == NULL) + if (alg == NULL || alg->parameter == NULL) return NULL; if (OBJ_obj2nid(alg->algorithm) != NID_mgf1) return NULL; |