summaryrefslogtreecommitdiff
path: root/Cryptlib/OpenSSL/crypto/comp/comp_lib.c
diff options
context:
space:
mode:
authorSteve McIntyre <93sam@debian.org>2019-05-03 01:44:29 +0100
committerSteve McIntyre <93sam@debian.org>2019-05-03 01:25:01 +0000
commit315e87677ba8af638402c25b0c0e8c1c8f3da46f (patch)
tree2996581c964f003406490a71f2269daa0feb493d /Cryptlib/OpenSSL/crypto/comp/comp_lib.c
parent878d860c31f2c233aa88e86d2218c45158c07da1 (diff)
downloadefi-boot-shim-315e87677ba8af638402c25b0c0e8c1c8f3da46f.tar.gz
efi-boot-shim-315e87677ba8af638402c25b0c0e8c1c8f3da46f.zip
Fix OBJ_create() to tolerate a NULL sn and ln
Cherry-picked fix from upstream MR at https://github.com/rhboot/shim/pull/174/commits/3a9e237b1baddf0d3192755406befb3e9fa5ca80 From: https://github.com/openssl/openssl/commit/f13615c5b828aeb8e3d9bf2545c803633d1c684f Apply an upstream patch from OpenSSL to tolerate a NULL sn. This avoids a NULL pointer reference in shim.c:verify_eku(). This was discovered because it causes a crash on ARM where, unlike x86, it does not necessarily have memory mapped at 0x0. Fixes: 6c180c6004ac ("shim: verify Extended Key Usage flags") Signed-off-by: dann frazier <dann.frazier@canonical.com>
Diffstat (limited to 'Cryptlib/OpenSSL/crypto/comp/comp_lib.c')
0 files changed, 0 insertions, 0 deletions