]> git.ipfire.org Git - thirdparty/openssl.git/commit
Fix memory leak in BN_rand_range()
authorvaldaarhun <icegambit91@gmail.com>
Wed, 10 Aug 2022 19:18:05 +0000 (00:48 +0530)
committerTomas Mraz <tomas@openssl.org>
Wed, 17 Aug 2022 16:42:14 +0000 (18:42 +0200)
commit70f589ae41928edda18470ba1c3df82af02a92b3
treebd1f423b035cdc927a7616c713e28909188b5d8d
parent17b94de3df327e6619e52529e345a340d4a0a100
Fix memory leak in BN_rand_range()

The patch enables BN_rand_range() to exit immediately
if BIGNUM *rnd is NULL.

CLA: trivial

Fixes: #18951
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Hugo Landau <hlandau@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/18982)
crypto/bn/bn_rand.c