From 7731a1c11cb727c471526512b8452519a8db54b7 Mon Sep 17 00:00:00 2001 From: Niels Dossche Date: Sun, 27 Oct 2024 21:48:17 +0100 Subject: [PATCH] Fix potential memory leak in OSSL_HPKE_CTX_new() ctx->propq is a duplicated string, but the error code does not free the duplicated string's memory. If e.g. EVP_CIPHER_fetch() fails then we can leak the string's memory. Reviewed-by: Tom Cosgrove Reviewed-by: Kurt Roeckx Reviewed-by: Matt Caswell (Merged from https://github.com/openssl/openssl/pull/25812) (cherry picked from commit 8ff6edb9da6199b130bfb50bc27b2e58cc815932) --- crypto/hpke/hpke.c | 1 + 1 file changed, 1 insertion(+) diff --git a/crypto/hpke/hpke.c b/crypto/hpke/hpke.c index 5a403097c41..8dca5584cbc 100644 --- a/crypto/hpke/hpke.c +++ b/crypto/hpke/hpke.c @@ -841,6 +841,7 @@ OSSL_HPKE_CTX *OSSL_HPKE_CTX_new(int mode, OSSL_HPKE_SUITE suite, int role, err: EVP_CIPHER_free(ctx->aead_ciph); + OPENSSL_free(ctx->propq); OPENSSL_free(ctx); return NULL; } -- 2.47.2