[openssl/openssl] b3cc0c: `EVP_PKEY_CTX_dup` segmentation fault fix
afshinpir
noreply at github.com
Mon Mar 27 10:56:51 UTC 2023
Branch: refs/heads/openssl-3.1
Home: https://github.com/openssl/openssl
Commit: b3cc0cd00e5168d6d752a7f579f36a7192b88806
https://github.com/openssl/openssl/commit/b3cc0cd00e5168d6d752a7f579f36a7192b88806
Author: afshinpir <afshinpir at users.noreply.github.com>
Date: 2023-03-27 (Mon, 27 Mar 2023)
Changed paths:
M crypto/evp/pmeth_lib.c
Log Message:
-----------
`EVP_PKEY_CTX_dup` segmentation fault fix
CLA: trivial
The the provider, context duplication method for signature, key
exchange, asymmetric cipher, and key encapsulation is optional. But if
they are missing, we will get a segmentation fault in `EVP_PKEY_CTX_dup`
because they are called without null pointer checking.
Reviewed-by: Paul Dale <pauli at openssl.org>
Reviewed-by: Shane Lontis <shane.lontis at oracle.com>
Reviewed-by: Tomas Mraz <tomas at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/20581)
(cherry picked from commit 864c70e43ea5f1d7fe20bfea457e53e79fd46b6e)
More information about the openssl-commits
mailing list