[go: nahoru, domu]

Skip to content

Commit

Permalink
Avoid dangling ptrs in header and data params for PEM_read_bio_ex
Browse files Browse the repository at this point in the history
In the event of a failure in PEM_read_bio_ex() we free the buffers we
allocated for the header and data buffers. However we were not clearing
the ptrs stored in *header and *data. Since, on success, the caller is
responsible for freeing these ptrs this can potentially lead to a double
free if the caller frees them even on failure.

Thanks to Dawei Wang for reporting this issue.

Based on a proposed patch by Kurt Roeckx.

CVE-2022-4450

Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Hugo Landau <hlandau@openssl.org>
  • Loading branch information
mattcaswell authored and levitte committed Feb 3, 2023
1 parent 43d8f88 commit bbcf509
Showing 1 changed file with 2 additions and 0 deletions.
2 changes: 2 additions & 0 deletions crypto/pem/pem_lib.c
Original file line number Diff line number Diff line change
Expand Up @@ -957,7 +957,9 @@ int PEM_read_bio_ex(BIO *bp, char **name_out, char **header,
*data = pem_malloc(len, flags);
if (*header == NULL || *data == NULL) {
pem_free(*header, flags, 0);
*header = NULL;
pem_free(*data, flags, 0);
*data = NULL;
goto end;
}
BIO_read(headerB, *header, headerlen);
Expand Down

0 comments on commit bbcf509

Please sign in to comment.