Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Don't read uninitialised data for short session IDs. #2583

Closed
wants to merge 1 commit into from

Conversation

davidben
Copy link
Contributor

@davidben davidben commented Feb 9, 2017

Apologies, we appear to have forgotten to upstream this one.

Checklist
  • tests are added or updated
    I'm not familiar with your current test harnesses, so I'm not sure where best to test this. I believe you just need to offer a ClientHello with short session ID and run with MSan. valgrind may work too?
Description of change

While it's always safe to read SSL_MAX_SSL_SESSION_ID_LENGTH bytes
from an SSL_SESSION's session_id array, the hash function would do
so with without considering if all those bytes had been written to.

This change checks session_id_length before possibly reading
uninitialised memory. Since the result of the hash function was already
attacker controlled, and since a lookup of a short session ID will
always fail, it doesn't appear that this is anything more than a clean
up.

In particular, ssl_get_prev_session uses a stack-allocated placeholder
SSL_SESSION as a lookup key, so the session_id array may be
uninitialised.

This was originally found with libFuzzer and MSan in
https://boringssl.googlesource.com/boringssl/+/e976e4349d693b4bbb97e1694f45be5a1b22c8c7,
then by Robert Swiecki with honggfuzz and MSan here. Thanks to both.

While it's always safe to read |SSL_MAX_SSL_SESSION_ID_LENGTH| bytes
from an |SSL_SESSION|'s |session_id| array, the hash function would do
so with without considering if all those bytes had been written to.

This change checks |session_id_length| before possibly reading
uninitialised memory. Since the result of the hash function was already
attacker controlled, and since a lookup of a short session ID will
always fail, it doesn't appear that this is anything more than a clean
up.

In particular, |ssl_get_prev_session| uses a stack-allocated placeholder
|SSL_SESSION| as a lookup key, so the |session_id| array may be
uninitialised.

This was originally found with libFuzzer and MSan in
https://boringssl.googlesource.com/boringssl/+/e976e4349d693b4bbb97e1694f45be5a1b22c8c7,
then by Robert Swiecki with honggfuzz and MSan here. Thanks to both.
@richsalz richsalz added 1.1.0 branch: master Merge to master branch labels Feb 9, 2017
Copy link
Contributor

@geoffthorpe geoffthorpe left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good.

levitte pushed a commit that referenced this pull request Feb 10, 2017
While it's always safe to read |SSL_MAX_SSL_SESSION_ID_LENGTH| bytes
from an |SSL_SESSION|'s |session_id| array, the hash function would do
so with without considering if all those bytes had been written to.

This change checks |session_id_length| before possibly reading
uninitialised memory. Since the result of the hash function was already
attacker controlled, and since a lookup of a short session ID will
always fail, it doesn't appear that this is anything more than a clean
up.

In particular, |ssl_get_prev_session| uses a stack-allocated placeholder
|SSL_SESSION| as a lookup key, so the |session_id| array may be
uninitialised.

This was originally found with libFuzzer and MSan in
https://boringssl.googlesource.com/boringssl/+/e976e4349d693b4bbb97e1694f45be5a1b22c8c7,
then by Robert Swiecki with honggfuzz and MSan here. Thanks to both.

Reviewed-by: Geoff Thorpe <[email protected]>
Reviewed-by: Rich Salz <[email protected]>
(Merged from #2583)
levitte pushed a commit that referenced this pull request Feb 10, 2017
While it's always safe to read |SSL_MAX_SSL_SESSION_ID_LENGTH| bytes
from an |SSL_SESSION|'s |session_id| array, the hash function would do
so with without considering if all those bytes had been written to.

This change checks |session_id_length| before possibly reading
uninitialised memory. Since the result of the hash function was already
attacker controlled, and since a lookup of a short session ID will
always fail, it doesn't appear that this is anything more than a clean
up.

In particular, |ssl_get_prev_session| uses a stack-allocated placeholder
|SSL_SESSION| as a lookup key, so the |session_id| array may be
uninitialised.

This was originally found with libFuzzer and MSan in
https://boringssl.googlesource.com/boringssl/+/e976e4349d693b4bbb97e1694f45be5a1b22c8c7,
then by Robert Swiecki with honggfuzz and MSan here. Thanks to both.

Reviewed-by: Geoff Thorpe <[email protected]>
Reviewed-by: Rich Salz <[email protected]>
(Merged from #2583)
(cherry picked from commit bd5d27c)
@richsalz
Copy link
Contributor

thanks!

@richsalz richsalz closed this Feb 10, 2017
@davidben
Copy link
Contributor Author

By the way, this affects 1.0.2 too. (Dunno what your backporting policy is.)

@levitte
Copy link
Member

levitte commented Feb 13, 2017

1.0.2 is maintained for bugs, so it's fitting to backport this to that branch as well. If it's easily cherry-picked, we simply do that. If not, we usually make a separate PR for 1.0.2.

@levitte
Copy link
Member

levitte commented Feb 13, 2017

Since this has already been applied, two reviewers must confirm that a backport is ok.

@levitte levitte added the branch: 1.0.2 Merge to OpenSSL_1_0_2-stable branch label Feb 13, 2017
@levitte
Copy link
Member

levitte commented Feb 13, 2017

(reopening for approval to backport to 1.0.2. I've just tested that it cherry-picks fine)

@levitte levitte reopened this Feb 13, 2017
Copy link
Member

@levitte levitte left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For 1.0.2

levitte pushed a commit that referenced this pull request Feb 13, 2017
While it's always safe to read |SSL_MAX_SSL_SESSION_ID_LENGTH| bytes
from an |SSL_SESSION|'s |session_id| array, the hash function would do
so with without considering if all those bytes had been written to.

This change checks |session_id_length| before possibly reading
uninitialised memory. Since the result of the hash function was already
attacker controlled, and since a lookup of a short session ID will
always fail, it doesn't appear that this is anything more than a clean
up.

In particular, |ssl_get_prev_session| uses a stack-allocated placeholder
|SSL_SESSION| as a lookup key, so the |session_id| array may be
uninitialised.

This was originally found with libFuzzer and MSan in
https://boringssl.googlesource.com/boringssl/+/e976e4349d693b4bbb97e1694f45be5a1b22c8c7,
then by Robert Swiecki with honggfuzz and MSan here. Thanks to both.

(cherry picked from commit bd5d27c)
Reviewed-by: Matt Caswell <[email protected]>
Reviewed-by: Richard Levitte <[email protected]>
(Merged from #2583)
@levitte
Copy link
Member

levitte commented Feb 13, 2017

Great, merged into 1.0.2 as well

f26015d

@levitte levitte closed this Feb 13, 2017
bernd-edlinger added a commit to bernd-edlinger/openssl that referenced this pull request Feb 13, 2017
levitte pushed a commit that referenced this pull request Feb 28, 2017
the uninitialized session_id now.

Reviewed-by: Matt Caswell <[email protected]>
Reviewed-by: Rich Salz <[email protected]>
(Merged from #2608)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
branch: master Merge to master branch branch: 1.0.2 Merge to OpenSSL_1_0_2-stable branch
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants