summaryrefslogtreecommitdiffstats
path: root/crypto/x509
diff options
context:
space:
mode:
authorBernd Edlinger <bernd.edlinger@hotmail.de>2024-01-08 15:31:32 +0100
committerTomas Mraz <tomas@openssl.org>2024-01-10 17:59:53 +0100
commit0151e772195fc03cce0f12e5e266e51dc15243a0 (patch)
tree578b00cbf37b2c2a6ec05c41052d9330ffb77b8d /crypto/x509
parent1d1ca79fe35dbe5c05faed5a2ef8c4de9c5adc49 (diff)
Fix a possible memory leak in sxnet_v2i
When a subsequent call to SXNET_add_id_asc fails e.g. because user is a string larger than 64 char or the zone is a duplicate zone id, or the zone is not an integer, a memory leak may be the result. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23234)
Diffstat (limited to 'crypto/x509')
-rw-r--r--crypto/x509/v3_sxnet.c4
1 files changed, 3 insertions, 1 deletions
diff --git a/crypto/x509/v3_sxnet.c b/crypto/x509/v3_sxnet.c
index 36620a2b67..b9ddfe3244 100644
--- a/crypto/x509/v3_sxnet.c
+++ b/crypto/x509/v3_sxnet.c
@@ -103,8 +103,10 @@ static SXNET *sxnet_v2i(X509V3_EXT_METHOD *method, X509V3_CTX *ctx,
int i;
for (i = 0; i < sk_CONF_VALUE_num(nval); i++) {
cnf = sk_CONF_VALUE_value(nval, i);
- if (!SXNET_add_id_asc(&sx, cnf->name, cnf->value, -1))
+ if (!SXNET_add_id_asc(&sx, cnf->name, cnf->value, -1)) {
+ SXNET_free(sx);
return NULL;
+ }
}
return sx;
}