diff options
author | Benjamin Kaduk <bkaduk@akamai.com> | 2017-06-09 13:31:11 -0400 |
---|---|---|
committer | Rich Salz <rsalz@openssl.org> | 2017-06-09 13:32:29 -0400 |
commit | 62b0a0dea612e3683c6bd4bef359fceda00238e8 (patch) | |
tree | 46da1e6a25e540698cb6b896440c8f70fffe6d2b /doc | |
parent | 388d679a4fd8a408e7c7c1867cc974cdc977ae63 (diff) | |
download | openssl-62b0a0dea612e3683c6bd4bef359fceda00238e8.tar.gz |
Fix memory leaks in CTLOG_new_from_base64
Move the call to ct_base64_decode(), which allocates, until after
the check for NULL output parameter.
Also place a cap on the number of padding characters used to decrement
the output length -- any more than two '='s is not permitted in a
well-formed base64 text. Prior to this change, ct_base64_decode() would
return a length of -1 along with allocated storage for an input of
"====".
Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Rich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/3379)
Diffstat (limited to 'doc')
0 files changed, 0 insertions, 0 deletions