[openssl-commits] [openssl] OpenSSL_1_1_1-stable update

Matt Caswell matt at openssl.org
Tue Jan 29 11:16:45 UTC 2019


The branch OpenSSL_1_1_1-stable has been updated
       via  9ed9875f0599babfb34bc52c17455765dfc0ac42 (commit)
      from  6b4f989233c7eb22e40106cc77e3007eb223bf4c (commit)


- Log -----------------------------------------------------------------
commit 9ed9875f0599babfb34bc52c17455765dfc0ac42
Author: Matt Caswell <matt at openssl.org>
Date:   Mon Jan 28 17:17:59 2019 +0000

    Don't leak memory from ERR_add_error_vdata()
    
    If the call the ERR_set_error_data() in ERR_add_error_vdata() fails then
    a mem leak can occur. This commit checks that we successfully added the
    error data, and if not frees the buffer.
    
    Fixes #8085
    
    Reviewed-by: Paul Yang <yang.yang at baishancloud.com>
    (Merged from https://github.com/openssl/openssl/pull/8105)
    
    (cherry picked from commit fa6b1ee1115c1e5e3a8286d833dcbaa2c1ce2b77)

-----------------------------------------------------------------------

Summary of changes:
 crypto/err/err.c | 18 +++++++++++++++---
 1 file changed, 15 insertions(+), 3 deletions(-)

diff --git a/crypto/err/err.c b/crypto/err/err.c
index 7bac677..48d8cfa 100644
--- a/crypto/err/err.c
+++ b/crypto/err/err.c
@@ -790,20 +790,31 @@ int ERR_get_next_error_library(void)
     return ret;
 }
 
-void ERR_set_error_data(char *data, int flags)
+static int err_set_error_data_int(char *data, int flags)
 {
     ERR_STATE *es;
     int i;
 
     es = ERR_get_state();
     if (es == NULL)
-        return;
+        return 0;
 
     i = es->top;
 
     err_clear_data(es, i);
     es->err_data[i] = data;
     es->err_data_flags[i] = flags;
+
+    return 1;
+}
+
+void ERR_set_error_data(char *data, int flags)
+{
+    /*
+     * This function is void so we cannot propagate the error return. Since it
+     * is also in the public API we can't change the return type.
+     */
+    err_set_error_data_int(data, flags);
 }
 
 void ERR_add_error_data(int num, ...)
@@ -843,7 +854,8 @@ void ERR_add_error_vdata(int num, va_list args)
         }
         OPENSSL_strlcat(str, a, (size_t)s + 1);
     }
-    ERR_set_error_data(str, ERR_TXT_MALLOCED | ERR_TXT_STRING);
+    if (!err_set_error_data_int(str, ERR_TXT_MALLOCED | ERR_TXT_STRING))
+        OPENSSL_free(str);
 }
 
 int ERR_set_mark(void)


More information about the openssl-commits mailing list