ibmswtpm2/ibmswtpm2-TcpServerPosix-Fix-use-of-uninitialized-value.patch
Michal Suchanek 39f0308cd8 Accepting request 1130291 from home:michals
- Update to version 164-2020-192.2
  * Implement the RSA 5 primes optimization.
  * Check command size for int32 overflow.
  * Add support for OpenSSL 3.1.x
  * Do not accept a NULL signKey in TPM2_CertifyX509
  * Add Nuvoton to gcc makefile
- New project URL - move to github
- Drop usptreamed ibmswtpm2-OpenSSL-3.1.patch

- drop ibmswtpm2-fix-ppc32.patch (upstream)

OBS-URL: https://build.opensuse.org/request/show/1130291
OBS-URL: https://build.opensuse.org/package/show/security/ibmswtpm2?expand=0&rev=30
2023-12-01 16:04:22 +00:00

31 lines
872 B
Diff

From 1f64c0bf768f05bfb1980fa354d99a29b26ce99a Mon Sep 17 00:00:00 2001
From: Michal Suchanek <msuchanek@suse.de>
Date: Mon, 17 Aug 2020 19:28:51 +0200
Subject: [PATCH] TcpServerPosix: Fix use of uninitialized value.
ReadUINT32 does not modify the output when it fails. Do not use the
output in that case.
Signed-off-by: Michal Suchanek <msuchanek@suse.de>
---
src/TcpServerPosix.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/src/TcpServerPosix.c b/src/TcpServerPosix.c
index ca9e2fd..b776448 100644
--- a/src/TcpServerPosix.c
+++ b/src/TcpServerPosix.c
@@ -264,7 +264,8 @@ PlatformServer(
{
uint32_t actHandle;
ok = ReadUINT32(s, &actHandle);
- WriteUINT32(s, _rpc__ACT_GetSignaled(actHandle));
+ if(ok)
+ WriteUINT32(s, _rpc__ACT_GetSignaled(actHandle));
break;
}
default:
--
2.42.0