The buffer used to process user commands when using advanced mode ("-adv")
can overflow the buffer by one byte if the the read buffer is exactly
BUFSIZZ bytes in length (16k). When processing the buffer we add a NUL
terminator to the buffer, so if the buffer is already full then we
overwrite by one byte when we add the NUL terminator.
This does not represent a security issue because this is entirely local
and would be "self-inflicted", i.e. not under attacker control.
This issue was reported to use by Igor Morgenstern from AISLE.
Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
MergeDate: Thu Mar 12 17:56:37 2026
(Merged from https://github.com/openssl/openssl/pull/30376)
static int user_data_add(struct user_data_st *user_data, size_t i)
{
- if (user_data->buflen != 0 || i > user_data->bufmax)
+ /*
+ * We must allow one byte for a NUL terminator so i must be less than
+ * bufmax
+ */
+ if (user_data->buflen != 0 || i >= user_data->bufmax)
return 0;
user_data->buflen = i;