[openssl/openssl] 7c51c0: Fix a possible memleak in eckey_priv_encode

Bernd Edlinger noreply at github.com
Sat Sep 9 14:40:13 UTC 2023


  Branch: refs/heads/OpenSSL_1_1_1-stable
  Home:   https://github.com/openssl/openssl
  Commit: 7c51c0e56a0f21912f4504c7a06c21eb4bc43c85
      https://github.com/openssl/openssl/commit/7c51c0e56a0f21912f4504c7a06c21eb4bc43c85
  Author: Bernd Edlinger <bernd.edlinger at hotmail.de>
  Date:   2023-09-09 (Sat, 09 Sep 2023)

  Changed paths:
    M crypto/ec/ec_ameth.c

  Log Message:
  -----------
  Fix a possible memleak in eckey_priv_encode

Additionally use OPENSSL_clear_free on the private
key data in case of error.

Reviewed-by: Tomas Mraz <tomas at openssl.org>
Reviewed-by: Hugo Landau <hlandau at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/22007)


  Commit: b13ef5e90a1d9c73f6c548ab5557a939a09744e0
      https://github.com/openssl/openssl/commit/b13ef5e90a1d9c73f6c548ab5557a939a09744e0
  Author: Bernd Edlinger <bernd.edlinger at hotmail.de>
  Date:   2023-09-09 (Sat, 09 Sep 2023)

  Changed paths:
    M crypto/rsa/rsa_ameth.c
    M test/recipes/15-test_rsapss.t

  Log Message:
  -----------
  Fix a possbile memleak in rsa_pub_encode

That seems to be only an issue for RSA-PSS with parameters.
Spotted by code review, so it looks like there is no test coverage for this.

Reviewed-by: Tomas Mraz <tomas at openssl.org>
Reviewed-by: Hugo Landau <hlandau at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/22007)


Compare: https://github.com/openssl/openssl/compare/ee60a4964ad4...b13ef5e90a1d


More information about the openssl-commits mailing list