Check for potentially exploitable overflows in asn1_d2i_read_bio
authorDr. Stephen Henson <steve@openssl.org>
Thu, 19 Apr 2012 12:13:59 +0000 (12:13 +0000)
committerDr. Stephen Henson <steve@openssl.org>
Thu, 19 Apr 2012 12:13:59 +0000 (12:13 +0000)
commit8d5505d099973a06781b7e0e5b65861859a7d994
tree58ae378a68521b231c4195d734f5cefe49785da5
parentd36e0ee460f41d6b64015455c4f5414a319865c3
Check for potentially exploitable overflows in asn1_d2i_read_bio
BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer
in CRYPTO_realloc_clean.

Thanks to Tavis Ormandy, Google Security Team, for discovering this
issue and to Adam Langley <agl@chromium.org> for fixing it. (CVE-2012-2110)
CHANGES
crypto/asn1/a_d2i_fp.c
crypto/buffer/buffer.c
crypto/mem.c