Hi,

This is the follow-up patch suggestion for [openssl.org #3387] Bug 
Report with fixes: null pointer and uninitialised memory errors, as 
requested.

After running parfait on 1.0.1h, I have removed the first part 
(uninitialized memory error.)

This is the patch for the other two files:

    2 --- openssl-1.0.1g/crypto/ocsp/ocsp_ht.c.~1~    Tue Jun  3 14:15:18 2014
    3 +++ openssl-1.0.1g/crypto/ocsp/ocsp_ht.c        Tue Jun  3 14:15:46 2014
    4 @@ -490,6 +490,9 @@
    5
    6         ctx = OCSP_sendreq_new(b, path, req, -1);
    7
    8 +       if (!ctx)
    9 +               return NULL;
   10 +
   11         do
   12                 {
   13                 rv = OCSP_sendreq_nbio(&resp, ctx);
   14 --- openssl-1.0.1g/ssl/d1_both.c.~1~    Tue Jun  3 14:16:25 2014
   15 +++ openssl-1.0.1g/ssl/d1_both.c        Tue Jun  3 14:17:26 2014
   16 @@ -1172,6 +1172,8 @@
   17
   18         frag = dtls1_hm_fragment_new(s->init_num, 0);
   19
   20 +       if (!frag)
   21 +               return 0;
   22         memcpy(frag->fragment, s->init_buf->data, s->init_num);
   23
   24         if ( is_ccs)

Thanks,

Jenny Yung
Oracle Solaris Security

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [email protected]

Reply via email to