summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBernd Edlinger <bernd.edlinger@hotmail.de>2023-09-19 20:15:18 +0200
committerBernd Edlinger <bernd.edlinger@hotmail.de>2023-09-21 14:43:08 +0200
commitd4f22a915ac50570015a23ad794032c4fb9496cb (patch)
treeb25c78aa773b755542ed718f77fa351db54b87e9
parent8c040c086ca11a519975c58961a5dc933aa6524a (diff)
Fix error handling in CRYPTO_get_ex_new_index
If an out of memory error happens when the index zero is reserved in a newly created ip->meth stack object, that reservation is not done in a second attempt, which makes various X_set_ex_data overwrite the value of X_set_app_data. Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22149)
-rw-r--r--crypto/ex_data.c2
1 files changed, 2 insertions, 0 deletions
diff --git a/crypto/ex_data.c b/crypto/ex_data.c
index c9ec9d3337..0412f38e9b 100644
--- a/crypto/ex_data.c
+++ b/crypto/ex_data.c
@@ -171,6 +171,8 @@ int ossl_crypto_get_ex_new_index_ex(OSSL_LIB_CTX *ctx, int class_index,
* "app_data" routines use ex_data index zero. See RT 3710. */
if (ip->meth == NULL
|| !sk_EX_CALLBACK_push(ip->meth, NULL)) {
+ sk_EX_CALLBACK_free(ip->meth);
+ ip->meth = NULL;
ERR_raise(ERR_LIB_CRYPTO, ERR_R_CRYPTO_LIB);
goto err;
}