diff options
| author | Steve McIntyre <93sam@debian.org> | 2019-05-03 01:44:29 +0100 |
|---|---|---|
| committer | Steve McIntyre <93sam@debian.org> | 2019-05-03 01:25:01 +0000 |
| commit | 315e87677ba8af638402c25b0c0e8c1c8f3da46f (patch) | |
| tree | 2996581c964f003406490a71f2269daa0feb493d /Cryptlib/OpenSSL/crypto/comp/comp_lib.c | |
| parent | 878d860c31f2c233aa88e86d2218c45158c07da1 (diff) | |
| download | efi-boot-shim-315e87677ba8af638402c25b0c0e8c1c8f3da46f.tar.gz efi-boot-shim-315e87677ba8af638402c25b0c0e8c1c8f3da46f.zip | |
Fix OBJ_create() to tolerate a NULL sn and ln
Cherry-picked fix from upstream MR at
https://github.com/rhboot/shim/pull/174/commits/3a9e237b1baddf0d3192755406befb3e9fa5ca80
From: https://github.com/openssl/openssl/commit/f13615c5b828aeb8e3d9bf2545c803633d1c684f
Apply an upstream patch from OpenSSL to tolerate a NULL sn. This
avoids a NULL pointer reference in shim.c:verify_eku(). This was
discovered because it causes a crash on ARM where, unlike x86, it does
not necessarily have memory mapped at 0x0.
Fixes: 6c180c6004ac ("shim: verify Extended Key Usage flags")
Signed-off-by: dann frazier <dann.frazier@canonical.com>
Diffstat (limited to 'Cryptlib/OpenSSL/crypto/comp/comp_lib.c')
0 files changed, 0 insertions, 0 deletions
