mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-22 11:15:43 +01:00
mbedtls_mpi_sub_abs: fix buffer overflow in error case
Fix a buffer overflow in mbedtls_mpi_sub_abs() when calculating |A| - |B| where |B| is larger than |A| and has more limbs (so the function should return MBEDTLS_ERR_MPI_NEGATIVE_VALUE). Fix #4042 Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
This commit is contained in:
parent
9a3cf3174d
commit
6260b70717
7
ChangeLog.d/mpi_sub_abs.txt
Normal file
7
ChangeLog.d/mpi_sub_abs.txt
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
Security
|
||||||
|
* Fix a buffer overflow in mbedtls_mpi_sub_abs() when calculating
|
||||||
|
|A| - |B| where |B| is larger than |A| and has more limbs (so the
|
||||||
|
function should return MBEDTLS_ERR_MPI_NEGATIVE_VALUE). Only
|
||||||
|
applications calling mbedtls_mpi_sub_abs() directly are affected:
|
||||||
|
all calls inside the library were safe since this function is
|
||||||
|
only called with |A| >= |B|. Reported by Guido Vranken in #4042.
|
@ -1354,6 +1354,12 @@ int mbedtls_mpi_sub_abs( mbedtls_mpi *X, const mbedtls_mpi *A, const mbedtls_mpi
|
|||||||
for( n = B->n; n > 0; n-- )
|
for( n = B->n; n > 0; n-- )
|
||||||
if( B->p[n - 1] != 0 )
|
if( B->p[n - 1] != 0 )
|
||||||
break;
|
break;
|
||||||
|
if( n > A->n )
|
||||||
|
{
|
||||||
|
/* B >= (2^ciL)^n > A */
|
||||||
|
ret = MBEDTLS_ERR_MPI_NEGATIVE_VALUE;
|
||||||
|
goto cleanup;
|
||||||
|
}
|
||||||
|
|
||||||
carry = mpi_sub_hlp( n, X->p, B->p );
|
carry = mpi_sub_hlp( n, X->p, B->p );
|
||||||
if( carry != 0 )
|
if( carry != 0 )
|
||||||
|
Loading…
Reference in New Issue
Block a user