From: Jiasheng Jiang Date: Tue, 15 Feb 2022 09:45:04 +0000 (+0800) Subject: rand: Add missing check for rand_get_global X-Git-Tag: openssl-3.2.0-alpha1~2925 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=09dca557332a2187598932388ac7bd7bbf16172b;p=thirdparty%2Fopenssl.git rand: Add missing check for rand_get_global As the potential failure of the rand_get_global(), for example fail to get lock, 'dgbl' could be NULL pointer and be dereferenced later. Therefore, it should be better to check it and return error if fails, like RAND_get0_primary() and other callers. Signed-off-by: Jiasheng Jiang Reviewed-by: Tomas Mraz Reviewed-by: Paul Dale Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/17690) --- diff --git a/crypto/rand/rand_lib.c b/crypto/rand/rand_lib.c index 4f36e84bd45..c772bcc79cd 100644 --- a/crypto/rand/rand_lib.c +++ b/crypto/rand/rand_lib.c @@ -529,6 +529,8 @@ static EVP_RAND_CTX *rand_new_seed(OSSL_LIB_CTX *libctx) EVP_RAND_CTX *ctx; char *name; + if (dgbl == NULL) + return NULL; name = dgbl->seed_name != NULL ? dgbl->seed_name : "SEED-SRC"; rand = EVP_RAND_fetch(libctx, name, dgbl->seed_propq); if (rand == NULL) { @@ -561,6 +563,8 @@ static EVP_RAND_CTX *rand_new_drbg(OSSL_LIB_CTX *libctx, EVP_RAND_CTX *parent, const OSSL_PARAM *settables; char *name, *cipher; + if (dgbl == NULL) + return NULL; name = dgbl->rng_name != NULL ? dgbl->rng_name : "CTR-DRBG"; rand = EVP_RAND_fetch(libctx, name, dgbl->rng_propq); if (rand == NULL) { @@ -763,6 +767,9 @@ static int random_conf_init(CONF_IMODULE *md, const CONF *cnf) return 0; } + if (dgbl == NULL) + return 0; + for (i = 0; i < sk_CONF_VALUE_num(elist); i++) { cval = sk_CONF_VALUE_value(elist, i); if (strcasecmp(cval->name, "random") == 0) {