Browse Source

OpenSSL: Fix possible null pointer dereference on an OCSP error path

Fix possible null pointer dereference in check_ocsp_resp() if an memory
allocation fails.

Signed-off-by: Ayala Beker <ayala.beker@intel.com>
Ayala Beker 9 years ago
parent
commit
443c8e18de
1 changed files with 2 additions and 0 deletions
  1. 2 0
      src/crypto/tls_openssl_ocsp.c

+ 2 - 0
src/crypto/tls_openssl_ocsp.c

@@ -562,6 +562,8 @@ enum ocsp_result check_ocsp_resp(SSL_CTX *ssl_ctx, SSL *ssl, X509 *cert,
 
 	if (basic->certs) {
 		untrusted = sk_X509_dup(basic->certs);
+		if (!untrusted)
+			goto fail;
 
 		num = sk_X509_num(basic->certs);
 		for (i = 0; i < num; i++) {