Increase the size of the stack buffer to prevent an overflow.
authorPauli <paul.dale@oracle.com>
Thu, 23 Feb 2017 03:46:01 +0000 (13:46 +1000)
committerRichard Levitte <levitte@openssl.org>
Thu, 23 Feb 2017 23:01:22 +0000 (00:01 +0100)
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Andy Polyakov <appro@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/2721)
(cherry picked from commit 8fce04ee3540ba3039bb66df34ea3f076a599ab9)

crypto/ec/eck_prn.c

index df9b37a750d6251edca7a0fe15e431509d475c93..176ec1f17308bd2a849fa0b9c074519090ced67c 100644 (file)
@@ -342,7 +342,7 @@ static int print_bin(BIO *fp, const char *name, const unsigned char *buf,
                      size_t len, int off)
 {
     size_t i;
-    char str[128];
+    char str[128 + 1 + 4];
 
     if (buf == NULL)
         return 1;