[openssl/openssl] 682d4a: Fix memory leak in BN_rand_range()
Sahil Siddiq
noreply at github.com
Wed Aug 17 16:45:09 UTC 2022
Branch: refs/heads/openssl-3.0
Home: https://github.com/openssl/openssl
Commit: 682d4a1204bc0a4c19ad3dd23f09d1e76959f8cf
https://github.com/openssl/openssl/commit/682d4a1204bc0a4c19ad3dd23f09d1e76959f8cf
Author: valdaarhun <icegambit91 at gmail.com>
Date: 2022-08-17 (Wed, 17 Aug 2022)
Changed paths:
M crypto/bn/bn_rand.c
Log Message:
-----------
Fix memory leak in BN_rand_range()
The patch enables BN_rand_range() to exit immediately
if BIGNUM *rnd is NULL.
CLA: trivial
Fixes: #18951
Reviewed-by: Matt Caswell <matt at openssl.org>
Reviewed-by: Paul Dale <pauli at openssl.org>
Reviewed-by: Hugo Landau <hlandau at openssl.org>
Reviewed-by: Tomas Mraz <tomas at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/18982)
(cherry picked from commit 70f589ae41928edda18470ba1c3df82af02a92b3)
More information about the openssl-commits
mailing list