[openssl-commits] [openssl] OpenSSL_1_1_1-stable update
matthias.st.pierre at ncp-e.com
matthias.st.pierre at ncp-e.com
Sun Oct 28 18:21:41 UTC 2018
The branch OpenSSL_1_1_1-stable has been updated
via d2953e5e7d8be6e83b35683f41bc0ae971782d16 (commit)
from 54dea92f0829584e194d1a930a309df95646f70d (commit)
- Log -----------------------------------------------------------------
commit d2953e5e7d8be6e83b35683f41bc0ae971782d16
Author: Dr. Matthias St. Pierre <Matthias.St.Pierre at ncp-e.com>
Date: Sun Oct 28 13:46:35 2018 +0100
drbg_lib: avoid NULL pointer dereference in drbg_add
Found by Coverity Scan
Reviewed-by: Bernd Edlinger <bernd.edlinger at hotmail.de>
Reviewed-by: Richard Levitte <levitte at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/7511)
(cherry picked from commit 59f90557dd6e35cf72ac72016609d759ac78fcb9)
-----------------------------------------------------------------------
Summary of changes:
crypto/rand/drbg_lib.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/crypto/rand/drbg_lib.c b/crypto/rand/drbg_lib.c
index f396f83..e7f383a 100644
--- a/crypto/rand/drbg_lib.c
+++ b/crypto/rand/drbg_lib.c
@@ -1010,7 +1010,7 @@ static int drbg_add(const void *buf, int num, double randomness)
int ret = 0;
RAND_DRBG *drbg = RAND_DRBG_get0_master();
size_t buflen;
- size_t seedlen = rand_drbg_seedlen(drbg);
+ size_t seedlen;
if (drbg == NULL)
return 0;
@@ -1018,6 +1018,8 @@ static int drbg_add(const void *buf, int num, double randomness)
if (num < 0 || randomness < 0.0)
return 0;
+ seedlen = rand_drbg_seedlen(drbg);
+
buflen = (size_t)num;
if (buflen < seedlen || randomness < (double) seedlen) {
More information about the openssl-commits
mailing list