Skip to content

Commit c80d044

Browse files
committed
Avoid a potential NULL pointer dereference in d2i_ECPrivateKey().
Reported by Robert Swiecki, who found the issue using honggfuzz. ok bcook@
1 parent 1bcb5a7 commit c80d044

File tree

1 file changed

+7
-1
lines changed

1 file changed

+7
-1
lines changed

lib/libcrypto/ec/ec_asn1.c

+7-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: ec_asn1.c,v 1.23 2017/01/29 17:49:23 beck Exp $ */
1+
/* $OpenBSD: ec_asn1.c,v 1.24 2017/05/26 16:32:14 jsing Exp $ */
22
/*
33
* Written by Nils Larsch for the OpenSSL project.
44
*/
@@ -1390,8 +1390,14 @@ d2i_ECPrivateKey(EC_KEY ** a, const unsigned char **in, long len)
13901390
ECerror(ERR_R_EC_LIB);
13911391
goto err;
13921392
}
1393+
13931394
pub_oct = ASN1_STRING_data(priv_key->publicKey);
13941395
pub_oct_len = ASN1_STRING_length(priv_key->publicKey);
1396+
if (pub_oct == NULL || pub_oct_len <= 0) {
1397+
ECerror(EC_R_BUFFER_TOO_SMALL);
1398+
goto err;
1399+
}
1400+
13951401
/* save the point conversion form */
13961402
ret->conv_form = (point_conversion_form_t) (pub_oct[0] & ~0x01);
13971403
if (!EC_POINT_oct2point(ret->group, ret->pub_key,

0 commit comments

Comments
 (0)