summary refs log tree commit diff
path: root/pkgs/os-specific/linux/pam_ssh_agent_auth/edcsa-crash-fix.patch
blob: 45ee87458161d580a6d3d99cbc9b8bd465bb7525 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
commit 1b0d9bcc5f5cd78b0bb1357d6a11da5d616ad26f
Author: Wout Mertens <Wout.Mertens@gmail.com>
Date:   Thu Jun 11 18:08:13 2020 +0200

    fix segfault when using ECDSA keys.
    
    Author: Marc Deslauriers <marc.deslauriers@canonical.com>
    Bug-Ubuntu: https://bugs.launchpad.net/bugs/1869512

diff --git a/ssh-ecdsa.c b/ssh-ecdsa.c
index 5b13b30..5bf29cc 100644
--- a/ssh-ecdsa.c
+++ b/ssh-ecdsa.c
@@ -46,7 +46,7 @@ ssh_ecdsa_sign(const Key *key, u_char **sigp, u_int *lenp,
     u_int len, dlen;
     Buffer b, bb;
 #if OPENSSL_VERSION_NUMBER >= 0x10100005L
-	BIGNUM *r, *s;
+	BIGNUM *r = NULL, *s = NULL;
 #endif
 
     if (key == NULL || key->type != KEY_ECDSA || key->ecdsa == NULL) {
@@ -137,20 +137,27 @@ ssh_ecdsa_verify(const Key *key, const u_char *signature, u_int signaturelen,
 
     /* parse signature */
     if ((sig = ECDSA_SIG_new()) == NULL)
-        pamsshagentauth_fatal("ssh_ecdsa_verify: DSA_SIG_new failed");
+        pamsshagentauth_fatal("ssh_ecdsa_verify: ECDSA_SIG_new failed");
 
     pamsshagentauth_buffer_init(&b);
     pamsshagentauth_buffer_append(&b, sigblob, len);
 #if OPENSSL_VERSION_NUMBER < 0x10100005L
     if ((pamsshagentauth_buffer_get_bignum2_ret(&b, sig->r) == -1) ||
         (pamsshagentauth_buffer_get_bignum2_ret(&b, sig->s) == -1))
+        pamsshagentauth_fatal("ssh_ecdsa_verify:"
+            "pamsshagentauth_buffer_get_bignum2_ret failed");
 #else
-    DSA_SIG_get0(sig, &r, &s);
+    if ((r = BN_new()) == NULL)
+        pamsshagentauth_fatal("ssh_ecdsa_verify: BN_new failed");
+    if ((s = BN_new()) == NULL)
+        pamsshagentauth_fatal("ssh_ecdsa_verify: BN_new failed");
     if ((pamsshagentauth_buffer_get_bignum2_ret(&b, r) == -1) ||
         (pamsshagentauth_buffer_get_bignum2_ret(&b, s) == -1))
-#endif
         pamsshagentauth_fatal("ssh_ecdsa_verify:"
             "pamsshagentauth_buffer_get_bignum2_ret failed");
+    if (ECDSA_SIG_set0(sig, r, s) != 1)
+        pamsshagentauth_fatal("ssh_ecdsa_verify: ECDSA_SIG_set0 failed");
+#endif
 
     /* clean up */
     memset(sigblob, 0, len);