[openssl-dev] [openssl.org #4401] [PATCH] plug potential memory leak(s) in OpenSSL 1.1 pre 4 in 'ec_lib.c'

Richard Moore via RT rt at openssl.org
Wed Mar 9 09:54:35 UTC 2016

On 9 March 2016 at 05:30, Peter Waltenberg <pwalten at au1.ibm.com> wrote:

> No, you got that right, NULL being 'safe' to free varies with OS.
​It shouldn't if you're programming in C, from the standard (C89):

The free function causes the space pointed to by ptr to be deallocated,
that is, made available for further allocation. If ptr is a null pointer,
no action occurs. Otherwise, if the argument does not match a pointer
earlier returned by the calloc , malloc , or realloc function, or if the
space has been deallocated by a call to free or realloc , the behavior is



Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4401
Please log in as guest with password guest if prompted

More information about the openssl-dev mailing list