-
-
Notifications
You must be signed in to change notification settings - Fork 11.1k
Closed
Labels
branch: 3.0Applies to openssl-3.0 branchApplies to openssl-3.0 branchbranch: masterApplies to master branchApplies to master branchtriaged: bugThe issue/pr is/fixes a bugThe issue/pr is/fixes a bug
Description
In speed.c, the option multi can be specified through command line:
Line 1592 in 0ad7578
| multi = atoi(opt_arg()); |
The value of multi is not sanitized and passed directly into do_multi:
Line 1809 in 0ad7578
| if (multi && do_multi(multi, size_num)) |
which is then used as size for memory allocation:
Line 3472 in 0ad7578
| fds = app_malloc(sizeof(*fds) * multi, "fd buffer for do_multi"); |
By specifying multi (e.g., making it very large), one can trigger a signed integer overflow during the computation of the allocation size, which is a bug and can be dangerous.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
branch: 3.0Applies to openssl-3.0 branchApplies to openssl-3.0 branchbranch: masterApplies to master branchApplies to master branchtriaged: bugThe issue/pr is/fixes a bugThe issue/pr is/fixes a bug