The branch openssl-3.0 has been updated via 2ee3e38f8f456db4b5afb023ae0472ff79204369 (commit) from 941c877bdb71038f6beeaf416d9b7b7951ff1f19 (commit)
- Log ----------------------------------------------------------------- commit 2ee3e38f8f456db4b5afb023ae0472ff79204369 Author: Pauli <ppz...@gmail.com> Date: Thu Jan 13 12:30:59 2022 +1100 coverity 1497107: dereference after null check Add null checks to avoid dereferencing a pointer that could be null. Reviewed-by: Tim Hudson <t...@openssl.org> Reviewed-by: Tomas Mraz <to...@openssl.org> Reviewed-by: David von Oheimb <david.von.ohe...@siemens.com> (Merged from https://github.com/openssl/openssl/pull/17488) ----------------------------------------------------------------------- Summary of changes: apps/lib/apps.c | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/apps/lib/apps.c b/apps/lib/apps.c index 25a6b6bcc3..07dd4550f2 100644 --- a/apps/lib/apps.c +++ b/apps/lib/apps.c @@ -696,10 +696,13 @@ int load_cert_certs(const char *uri, if (ret) { if (pcert != NULL) warn_cert(uri, *pcert, 0, vpm); - warn_certs(uri, *pcerts, 1, vpm); + if (pcerts != NULL) + warn_certs(uri, *pcerts, 1, vpm); } else { - sk_X509_pop_free(*pcerts, X509_free); - *pcerts = NULL; + if (pcerts != NULL) { + sk_X509_pop_free(*pcerts, X509_free); + *pcerts = NULL; + } } return ret; }