[openssl-commits] [openssl] OpenSSL_1_1_1-stable update

matthias.st.pierre at ncp-e.com matthias.st.pierre at ncp-e.com
Sun Oct 28 18:21:41 UTC 2018


The branch OpenSSL_1_1_1-stable has been updated
       via  d2953e5e7d8be6e83b35683f41bc0ae971782d16 (commit)
      from  54dea92f0829584e194d1a930a309df95646f70d (commit)


- Log -----------------------------------------------------------------
commit d2953e5e7d8be6e83b35683f41bc0ae971782d16
Author: Dr. Matthias St. Pierre <Matthias.St.Pierre at ncp-e.com>
Date:   Sun Oct 28 13:46:35 2018 +0100

    drbg_lib: avoid NULL pointer dereference in drbg_add
    
    Found by Coverity Scan
    
    Reviewed-by: Bernd Edlinger <bernd.edlinger at hotmail.de>
    Reviewed-by: Richard Levitte <levitte at openssl.org>
    (Merged from https://github.com/openssl/openssl/pull/7511)
    
    (cherry picked from commit 59f90557dd6e35cf72ac72016609d759ac78fcb9)

-----------------------------------------------------------------------

Summary of changes:
 crypto/rand/drbg_lib.c | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/crypto/rand/drbg_lib.c b/crypto/rand/drbg_lib.c
index f396f83..e7f383a 100644
--- a/crypto/rand/drbg_lib.c
+++ b/crypto/rand/drbg_lib.c
@@ -1010,7 +1010,7 @@ static int drbg_add(const void *buf, int num, double randomness)
     int ret = 0;
     RAND_DRBG *drbg = RAND_DRBG_get0_master();
     size_t buflen;
-    size_t seedlen = rand_drbg_seedlen(drbg);
+    size_t seedlen;
 
     if (drbg == NULL)
         return 0;
@@ -1018,6 +1018,8 @@ static int drbg_add(const void *buf, int num, double randomness)
     if (num < 0 || randomness < 0.0)
         return 0;
 
+    seedlen = rand_drbg_seedlen(drbg);
+
     buflen = (size_t)num;
 
     if (buflen < seedlen || randomness < (double) seedlen) {


More information about the openssl-commits mailing list