mirror of
git://git.gnupg.org/gnupg.git
synced 2025-01-10 13:04:23 +01:00
gpg: Cap size of attribute packets at 16MB.
* g10/parse-packet.c (parse_attribute): Avoid xmalloc failure and cap size of packet. -- Tavis Ormandy reported a fatal error for attribute packets with a zero length payload. This is due to a check in Libgcrypt's xmalloc which rejects a malloc(0) instead of silently allocating 1 byte. The fix is obvious. In addition we cap the size of attribute packets similar to what we do with user id packets. OpenPGP keys are not the proper way to store movies. Resolved conflicts: g10/parse-packet.c - indentation. Use plain fprintf.
This commit is contained in:
parent
40215d8ecd
commit
9a1e195348
@ -2214,11 +2214,22 @@ parse_attribute( IOBUF inp, int pkttype, unsigned long pktlen, PACKET *packet )
|
||||
|
||||
(void)pkttype;
|
||||
|
||||
/* We better cap the size of an attribute packet to make DoS not
|
||||
too easy. 16MB should be more then enough for one attribute
|
||||
packet (ie. a photo). */
|
||||
if (pktlen > 16*1024*1024) {
|
||||
log_error ("packet(%d) too large\n", pkttype);
|
||||
if (list_mode)
|
||||
fprintf (listfp, ":attribute packet: [too large]\n");
|
||||
iobuf_skip_rest (inp, pktlen, 0);
|
||||
return G10ERR_INVALID_PACKET;
|
||||
}
|
||||
|
||||
#define EXTRA_UID_NAME_SPACE 71
|
||||
packet->pkt.user_id = xmalloc_clear(sizeof *packet->pkt.user_id
|
||||
+ EXTRA_UID_NAME_SPACE);
|
||||
packet->pkt.user_id->ref=1;
|
||||
packet->pkt.user_id->attrib_data = xmalloc(pktlen);
|
||||
packet->pkt.user_id->attrib_data = xmalloc(pktlen? pktlen:1);
|
||||
packet->pkt.user_id->attrib_len = pktlen;
|
||||
|
||||
p = packet->pkt.user_id->attrib_data;
|
||||
|
Loading…
x
Reference in New Issue
Block a user