[openssl/openssl] 7c51c0: Fix a possible memleak in eckey_priv_encode
Bernd Edlinger
noreply at github.com
Sat Sep 9 14:40:13 UTC 2023
Branch: refs/heads/OpenSSL_1_1_1-stable
Home: https://github.com/openssl/openssl
Commit: 7c51c0e56a0f21912f4504c7a06c21eb4bc43c85
https://github.com/openssl/openssl/commit/7c51c0e56a0f21912f4504c7a06c21eb4bc43c85
Author: Bernd Edlinger <bernd.edlinger at hotmail.de>
Date: 2023-09-09 (Sat, 09 Sep 2023)
Changed paths:
M crypto/ec/ec_ameth.c
Log Message:
-----------
Fix a possible memleak in eckey_priv_encode
Additionally use OPENSSL_clear_free on the private
key data in case of error.
Reviewed-by: Tomas Mraz <tomas at openssl.org>
Reviewed-by: Hugo Landau <hlandau at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/22007)
Commit: b13ef5e90a1d9c73f6c548ab5557a939a09744e0
https://github.com/openssl/openssl/commit/b13ef5e90a1d9c73f6c548ab5557a939a09744e0
Author: Bernd Edlinger <bernd.edlinger at hotmail.de>
Date: 2023-09-09 (Sat, 09 Sep 2023)
Changed paths:
M crypto/rsa/rsa_ameth.c
M test/recipes/15-test_rsapss.t
Log Message:
-----------
Fix a possbile memleak in rsa_pub_encode
That seems to be only an issue for RSA-PSS with parameters.
Spotted by code review, so it looks like there is no test coverage for this.
Reviewed-by: Tomas Mraz <tomas at openssl.org>
Reviewed-by: Hugo Landau <hlandau at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/22007)
Compare: https://github.com/openssl/openssl/compare/ee60a4964ad4...b13ef5e90a1d
More information about the openssl-commits
mailing list