From a5be9d65987daa219d9663330ad1ecc53448be4d Mon Sep 17 00:00:00 2001 From: Niels Dossche Date: Sun, 27 Oct 2024 21:48:17 +0100 Subject: [PATCH] Fix potential memory leak in OSSL_HPKE_CTX_new() ctx->propq is a duplicated string, but the error code does not free the duplicated string's memory. If e.g. EVP_CIPHER_fetch() fails then we can leak the string's memory. Reviewed-by: Tom Cosgrove Reviewed-by: Kurt Roeckx Reviewed-by: Matt Caswell (Merged from https://github.com/openssl/openssl/pull/25812) (cherry picked from commit 8ff6edb9da6199b130bfb50bc27b2e58cc815932) --- crypto/hpke/hpke.c | 1 + 1 file changed, 1 insertion(+) diff --git a/crypto/hpke/hpke.c b/crypto/hpke/hpke.c index a53488d9ec4..8fd40bb6117 100644 --- a/crypto/hpke/hpke.c +++ b/crypto/hpke/hpke.c @@ -842,6 +842,7 @@ OSSL_HPKE_CTX *OSSL_HPKE_CTX_new(int mode, OSSL_HPKE_SUITE suite, int role, err: EVP_CIPHER_free(ctx->aead_ciph); + OPENSSL_free(ctx->propq); OPENSSL_free(ctx); return NULL; } -- 2.47.2