[openssl/openssl] b3cc0c: `EVP_PKEY_CTX_dup` segmentation fault fix

afshinpir noreply at github.com
Mon Mar 27 10:56:51 UTC 2023


  Branch: refs/heads/openssl-3.1
  Home:   https://github.com/openssl/openssl
  Commit: b3cc0cd00e5168d6d752a7f579f36a7192b88806
      https://github.com/openssl/openssl/commit/b3cc0cd00e5168d6d752a7f579f36a7192b88806
  Author: afshinpir <afshinpir at users.noreply.github.com>
  Date:   2023-03-27 (Mon, 27 Mar 2023)

  Changed paths:
    M crypto/evp/pmeth_lib.c

  Log Message:
  -----------
  `EVP_PKEY_CTX_dup` segmentation fault fix

CLA: trivial
The the provider, context duplication method for signature, key
exchange, asymmetric cipher, and key encapsulation is optional. But if
they are missing, we will get a segmentation fault in `EVP_PKEY_CTX_dup`
because they are called without null pointer checking.

Reviewed-by: Paul Dale <pauli at openssl.org>
Reviewed-by: Shane Lontis <shane.lontis at oracle.com>
Reviewed-by: Tomas Mraz <tomas at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/20581)

(cherry picked from commit 864c70e43ea5f1d7fe20bfea457e53e79fd46b6e)




More information about the openssl-commits mailing list