mirror of https://github.com/openssl/openssl.git
If a file supplied to RAND_load_file is too big (more than INT_MAX bytes), it is possible to trigger a signer integer overflow during ret calculation. Avoid it by returning early when we are about to hit it on the next iteration. Reported-by: Liu-Ermeng <liuermeng2@huawei.com> Resolves: https://github.com/openssl/openssl/issues/28375 Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Saša Nedvědický <sashan@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/28379) |
||
|---|---|---|
| .. | ||
| build.info | ||
| prov_seed.c | ||
| rand_deprecated.c | ||
| rand_egd.c | ||
| rand_err.c | ||
| rand_lib.c | ||
| rand_local.h | ||
| rand_meth.c | ||
| rand_pool.c | ||
| rand_uniform.c | ||
| randfile.c | ||