diff options
author | Neil Horman <nhorman@openssl.org> | 2023-11-22 12:16:54 -0500 |
---|---|---|
committer | Neil Horman <nhorman@openssl.org> | 2023-12-01 11:14:30 -0500 |
commit | b8514a7d0aeed0b681a528ff59dba6fb9ab8ce7c (patch) | |
tree | eda602d6050044137637287cb125dda2cebd84d7 /doc | |
parent | c91c762e8ae18f7738b7331137183eb2539d4da2 (diff) |
Don't free aliased pointers in ctx cmp_ctx tests
Coverity recorded issues 1551739 and 1551737, a potential double free in the
tests. It occurs when the DUP operation fails in such a way val3_read is
returned as the same pointer as val2_read. Ideally it should never
happen, but resetting val3_read to 0 should satisfy coverity that there
is no issue here
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Todd Short <todd.short@me.com>
(Merged from https://github.com/openssl/openssl/pull/22800)
(cherry picked from commit c8ca810da9c47d8cb6988fd14e1cb4e20b0877e8)
Diffstat (limited to 'doc')
0 files changed, 0 insertions, 0 deletions