summaryrefslogtreecommitdiff
path: root/testing/tests/ikev1/multi-level-ca-pathlen/pretest.dat
diff options
context:
space:
mode:
authorTobias Brunner <tobias@strongswan.org>2021-09-28 17:52:08 +0200
committerDaniil Baturin <daniil@baturin.org>2021-11-24 08:06:38 +0700
commit2d899ce706ccb01dc9e8193aebca297058094391 (patch)
treeb641749cda2329292de042f1e8c3ed9da140a8cd /testing/tests/ikev1/multi-level-ca-pathlen/pretest.dat
parent5dba7a44abbc055362b8a3c407a4f60cbd3c6d3a (diff)
downloadvyos-strongswan-2d899ce706ccb01dc9e8193aebca297058094391.tar.gz
vyos-strongswan-2d899ce706ccb01dc9e8193aebca297058094391.zip
Reject RSASSA-PSS params with negative salt length
The `salt_len` member in the struct is of type `ssize_t` because we use negative values for special automatic salt lengths when generating signatures. Not checking this could lead to an integer overflow. The value is assigned to the `len` field of a chunk (`size_t`), which is further used in calculations to check the padding structure and (if that is passed by a matching crafted signature value) eventually a memcpy() that will result in a segmentation fault. Fixes: a22316520b91 ("signature-params: Add functions to parse/build ASN.1 RSASSA-PSS params") Fixes: 7d6b81648b2d ("gmp: Add support for RSASSA-PSS signature verification") Fixes: CVE-2021-41990 Signed-off-by: Daniil Baturin <daniil@baturin.org>
Diffstat (limited to 'testing/tests/ikev1/multi-level-ca-pathlen/pretest.dat')
0 files changed, 0 insertions, 0 deletions