mirror of https://github.com/openssl/openssl.git
				
				
				
			Fix memory leak in BN_rand_range()
The patch enables BN_rand_range() to exit immediately
if BIGNUM *rnd is NULL.
CLA: trivial
Fixes: #18951
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Hugo Landau <hlandau@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/18982)
(cherry picked from commit 70f589ae41)
			
			
This commit is contained in:
		
							parent
							
								
									0f0634bc8c
								
							
						
					
					
						commit
						682d4a1204
					
				| 
						 | 
				
			
			@ -136,6 +136,11 @@ static int bnrand_range(BNRAND_FLAG flag, BIGNUM *r, const BIGNUM *range,
 | 
			
		|||
    int n;
 | 
			
		||||
    int count = 100;
 | 
			
		||||
 | 
			
		||||
    if (r == NULL) {
 | 
			
		||||
        ERR_raise(ERR_LIB_BN, ERR_R_PASSED_NULL_PARAMETER);
 | 
			
		||||
        return 0;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (range->neg || BN_is_zero(range)) {
 | 
			
		||||
        ERR_raise(ERR_LIB_BN, BN_R_INVALID_RANGE);
 | 
			
		||||
        return 0;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
		Reference in New Issue