]> git.ipfire.org Git - thirdparty/openssl.git/commitdiff
Fix potential memory leak in BIO_get_accept_socket()
authorNiels Dossche <niels.dossche@ugent.be>
Mon, 28 Oct 2024 15:34:55 +0000 (16:34 +0100)
committerTomas Mraz <tomas@openssl.org>
Thu, 2 Jan 2025 13:06:51 +0000 (14:06 +0100)
When BIO_parse_hostserv() fails it may still have allocated memory, yet
this memory is not freed. Fix it by jumping to the err label.

Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/25817)

crypto/bio/bio_addr.c
crypto/bio/bio_sock.c

index 4b2cef6936e13eceb298e6b22506b4d491ad1396..568c0b4a1f8fd05ce70ccaf8d1c02e11c0b55db2 100644 (file)
@@ -571,8 +571,13 @@ int BIO_parse_hostserv(const char *hostserv, char **host, char **service,
             *service = NULL;
         } else {
             *service = OPENSSL_strndup(p, pl);
-            if (*service == NULL)
+            if (*service == NULL) {
+                if (h != NULL && host != NULL) {
+                    OPENSSL_free(*host);
+                    *host = NULL;
+                }
                 return 0;
+            }
         }
     }
 
index 3ea122e2b95934a8d7595cc0de239302b9a45e3b..22dbf38b00b0d05192c636ce896a9634749c9ccb 100644 (file)
@@ -259,7 +259,7 @@ int BIO_get_accept_socket(char *host, int bind_mode)
         return INVALID_SOCKET;
 
     if (BIO_sock_init() != 1)
-        return INVALID_SOCKET;
+        goto err;
 
     if (BIO_lookup(h, p, BIO_LOOKUP_SERVER, AF_UNSPEC, SOCK_STREAM, &res) != 0)
         goto err;