Fix PKCS7 parser failing to parse degenerated certificate messages (#27435)

* Fix PKCS7 parser failing to parse degenerated certificate messages

* Add cl
This commit is contained in:
Steven Clark
2024-06-11 12:57:54 -04:00
committed by GitHub
parent d152de025d
commit 64316fa084
4 changed files with 23 additions and 11 deletions

3
changelog/27435.txt Normal file
View File

@@ -0,0 +1,3 @@
```release-note:bug
helper/pkcs7: Fix parsing certain messages containing only certificates
```

View File

@@ -140,25 +140,22 @@ func readObject(ber []byte, offset int) (asn1Object, int, error) {
tagStart := offset tagStart := offset
b := ber[offset] b := ber[offset]
offset++ offset++
if offset >= berLen {
return nil, 0, errors.New("ber2der: cannot move offset forward, end of ber data reached")
}
tag := b & 0x1F // last 5 bits tag := b & 0x1F // last 5 bits
if tag == 0x1F { if tag == 0x1F {
tag = 0 tag = 0
for ber[offset] >= 0x80 {
tag = tag*128 + ber[offset] - 0x80
offset++
if offset >= berLen { if offset >= berLen {
return nil, 0, errors.New("ber2der: cannot move offset forward, end of ber data reached") return nil, 0, errors.New("ber2der: cannot move offset forward, end of ber data reached")
} }
for ber[offset] >= 0x80 {
if offset >= berLen {
return nil, 0, errors.New("ber2der: cannot move offset forward, end of ber data reached")
}
tag = tag*128 + ber[offset] - 0x80
offset++
} }
// jvehent 20170227: this doesn't appear to be used anywhere... // jvehent 20170227: this doesn't appear to be used anywhere...
// tag = tag*128 + ber[offset] - 0x80 // tag = tag*128 + ber[offset] - 0x80
offset++ offset++
if offset >= berLen {
return nil, 0, errors.New("ber2der: cannot move offset forward, end of ber data reached")
}
} }
tagEnd := offset tagEnd := offset
@@ -170,14 +167,17 @@ func readObject(ber []byte, offset int) (asn1Object, int, error) {
} }
// read length // read length
var length int var length int
l := ber[offset]
offset++
if offset >= berLen { if offset >= berLen {
return nil, 0, errors.New("ber2der: cannot move offset forward, end of ber data reached") return nil, 0, errors.New("ber2der: cannot move offset forward, end of ber data reached")
} }
l := ber[offset]
offset++
indefinite := false indefinite := false
if l > 0x80 { if l > 0x80 {
numberOfBytes := (int)(l & 0x7F) numberOfBytes := (int)(l & 0x7F)
if offset >= berLen {
return nil, 0, errors.New("ber2der: cannot move offset forward, end of ber data reached")
}
if numberOfBytes > 4 { // int is only guaranteed to be 32bit if numberOfBytes > 4 { // int is only guaranteed to be 32bit
return nil, 0, errors.New("ber2der: BER tag length too long") return nil, 0, errors.New("ber2der: BER tag length too long")
} }
@@ -217,6 +217,9 @@ func readObject(ber []byte, offset int) (asn1Object, int, error) {
return nil, 0, errors.New("ber2der: Indefinite form tag must have constructed encoding") return nil, 0, errors.New("ber2der: Indefinite form tag must have constructed encoding")
} }
if kind == 0 { if kind == 0 {
if offset >= berLen {
return nil, 0, errors.New("ber2der: cannot move offset forward, end of ber data reached")
}
obj = asn1Primitive{ obj = asn1Primitive{
tagBytes: ber[tagStart:tagEnd], tagBytes: ber[tagStart:tagEnd],
length: length, length: length,

View File

@@ -80,7 +80,7 @@ func TestBer2Der_Negatives(t *testing.T) {
{[]byte{0x30, 0x84, 0x80, 0x0, 0x0, 0x0}, "length is negative"}, {[]byte{0x30, 0x84, 0x80, 0x0, 0x0, 0x0}, "length is negative"},
{[]byte{0x30, 0x82, 0x0, 0x1}, "length has leading zero"}, {[]byte{0x30, 0x82, 0x0, 0x1}, "length has leading zero"},
{[]byte{0x30, 0x80, 0x1, 0x2, 0x1, 0x2}, "Invalid BER format"}, {[]byte{0x30, 0x80, 0x1, 0x2, 0x1, 0x2}, "Invalid BER format"},
{[]byte{0x30, 0x80, 0x1, 0x2}, "end of ber data reached"}, {[]byte{0x30, 0x80, 0x1, 0x2}, "BER tag length is more than available data"},
{[]byte{0x30, 0x03, 0x01, 0x02}, "length is more than available data"}, {[]byte{0x30, 0x03, 0x01, 0x02}, "length is more than available data"},
{[]byte{0x30}, "end of ber data reached"}, {[]byte{0x30}, "end of ber data reached"},
{[]byte("?0"), "end of ber data reached"}, {[]byte("?0"), "end of ber data reached"},

View File

@@ -256,6 +256,12 @@ func TestDegenerateCertificate(t *testing.T) {
} }
testOpenSSLParse(t, deg) testOpenSSLParse(t, deg)
pem.Encode(os.Stdout, &pem.Block{Type: "PKCS7", Bytes: deg}) pem.Encode(os.Stdout, &pem.Block{Type: "PKCS7", Bytes: deg})
// Make sure the library can parse the PKCS7 we generated along with OpenSSL
_, err = Parse(deg)
if err != nil {
t.Fatalf("failed parsing degenerated certificate: %v", err)
}
} }
// writes the cert to a temporary file and tests that openssl can read it. // writes the cert to a temporary file and tests that openssl can read it.