Fix memory leak on bad inputs.
This commit is contained in:
parent
edf6b025b1
commit
7f1022a8b1
6
CHANGES
6
CHANGES
@ -164,6 +164,9 @@
|
|||||||
|
|
||||||
Changes between 1.0.0d and 1.0.0e [xx XXX xxxx]
|
Changes between 1.0.0d and 1.0.0e [xx XXX xxxx]
|
||||||
|
|
||||||
|
*) Fix x509_name_ex_d2i memory leak on bad inputs.
|
||||||
|
[Bodo Moeller]
|
||||||
|
|
||||||
*) Remove hard coded ecdsaWithSHA1 signature tests in ssl code and check
|
*) Remove hard coded ecdsaWithSHA1 signature tests in ssl code and check
|
||||||
signature public key algorithm by using OID xref utilities instead.
|
signature public key algorithm by using OID xref utilities instead.
|
||||||
Before this you could only use some ECC ciphersuites with SHA1 only.
|
Before this you could only use some ECC ciphersuites with SHA1 only.
|
||||||
@ -1058,6 +1061,9 @@
|
|||||||
|
|
||||||
Changes between 0.9.8r and 0.9.8s [xx XXX xxxx]
|
Changes between 0.9.8r and 0.9.8s [xx XXX xxxx]
|
||||||
|
|
||||||
|
*) Fix x509_name_ex_d2i memory leak on bad inputs.
|
||||||
|
[Bodo Moeller]
|
||||||
|
|
||||||
*) Add protection against ECDSA timing attacks as mentioned in the paper
|
*) Add protection against ECDSA timing attacks as mentioned in the paper
|
||||||
by Billy Bob Brumley and Nicola Tuveri, see:
|
by Billy Bob Brumley and Nicola Tuveri, see:
|
||||||
|
|
||||||
|
@ -214,7 +214,9 @@ static int x509_name_ex_d2i(ASN1_VALUE **val,
|
|||||||
*val = nm.a;
|
*val = nm.a;
|
||||||
*in = p;
|
*in = p;
|
||||||
return ret;
|
return ret;
|
||||||
err:
|
err:
|
||||||
|
if (nm.x != NULL)
|
||||||
|
X509_NAME_free(nm.x);
|
||||||
ASN1err(ASN1_F_X509_NAME_EX_D2I, ERR_R_NESTED_ASN1_ERROR);
|
ASN1err(ASN1_F_X509_NAME_EX_D2I, ERR_R_NESTED_ASN1_ERROR);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user