From: Tim Hudson Date: Sun, 11 May 2014 12:29:59 +0000 (+0100) Subject: safety check to ensure we dont send out beyond the users buffer X-Git-Tag: OpenSSL_1_0_0m~38 X-Git-Url: https://git.librecmc.org/?a=commitdiff_plain;h=0552cbcdaaa367f911ffa62af0eda4ac54a3eee4;p=oweals%2Fopenssl.git safety check to ensure we dont send out beyond the users buffer --- diff --git a/ssl/s3_pkt.c b/ssl/s3_pkt.c index 0f33204bad..772c089294 100644 --- a/ssl/s3_pkt.c +++ b/ssl/s3_pkt.c @@ -597,6 +597,22 @@ int ssl3_write_bytes(SSL *s, int type, const void *buf_, int len) } } + /* ensure that if we end up with a smaller value of data to write + * out than the the original len from a write which didn't complete + * for non-blocking I/O and also somehow ended up avoiding + * the check for this in ssl3_write_pending/SSL_R_BAD_WRITE_RETRY as + * it must never be possible to end up with (len-tot) as a large + * number that will then promptly send beyond the end of the users + * buffer ... so we trap and report the error in a way the user + * will notice + */ + if ( len < tot) + { + SSLerr(SSL_F_SSL3_WRITE_BYTES,SSL_R_BAD_LENGTH); + return(-1); + } + + n=(len-tot); for (;;) {