-
-
Notifications
You must be signed in to change notification settings - Fork 11.1k
Closed
Labels
branch: 1.1.1Applies to OpenSSL_1_1_1-stable branch (EOL)Applies to OpenSSL_1_1_1-stable branch (EOL)branch: 3.0Applies to openssl-3.0 branchApplies to openssl-3.0 branchbranch: masterApplies to master branchApplies to master branchgood first issueBite size change that could be a good startBite size change that could be a good starttriaged: bugThe issue/pr is/fixes a bugThe issue/pr is/fixes a bug
Description
Hi, I found a potential null pointer dereference bug in the project source code of openssl, and I have shown the execution sequence of the program that may generate the bug on the graph below. The red text illustrates the steps that generate the bug, the red arrows represent the call relationships, the file path can be seen in the blue framed section.

Although the code shown is for version 1.1.1, this potential bug is still present in the current version
Lines 3483 to 3487 in bf16ee4
| if (CHECK_AND_SKIP_PREFIX(p, "+F:")) { | |
| int alg; | |
| int j; | |
| alg = atoi(sstrsep(&p, sep)); |
would you can help to check if this bug is true?thank you!
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
branch: 1.1.1Applies to OpenSSL_1_1_1-stable branch (EOL)Applies to OpenSSL_1_1_1-stable branch (EOL)branch: 3.0Applies to openssl-3.0 branchApplies to openssl-3.0 branchbranch: masterApplies to master branchApplies to master branchgood first issueBite size change that could be a good startBite size change that could be a good starttriaged: bugThe issue/pr is/fixes a bugThe issue/pr is/fixes a bug