On Sat, 2012-04-07 at 21:44 +0200, Stephen Henson via RT wrote: 
> > [[email protected] - Sat Apr 07 15:39:00 2012]:
> > 
> > This bug report applies to the OpenSSL FIPS 2.0 module.
> > 
> > If dctx->get_entropy() fails and thus the tout is set to NULL we will
> > set the output entropy pointer to NULL + blocklen. This will later lead
> > to crash as we check for NULL entropy before calling
> > fips_cleanup_entropy() but it will be invalid non-NULL pointer in this
> > case.
> > 
> > The attached patch prevents returning invalid non-NULL pointer from the 
> > fips_get_entropy() function.
> > 
> > 
> 
> While that is valid changing the FIPS code at this late stage of the
> validation is problematical.
> 
> Since the output entropy pointer is restored to its original value in
> fips_cleanup_entropy can't we just make sure that function treats a NULL
> parameter as a no-op instead? 

Yes, that's surely possible as well.

-- 
Tomas Mraz
No matter how far down the wrong road you've gone, turn back.
                                              Turkish proverb

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [email protected]

Reply via email to