mirror of
https://github.com/openssl/openssl.git
synced 2024-11-27 12:04:38 +08:00
Fix a possible memleak in SRP_VBASE_new
In the error handling case the memory in vb->users_pwd was accidentally not released. Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21981)
This commit is contained in:
parent
17dd9a2c62
commit
68e95f7840
@ -281,6 +281,7 @@ SRP_VBASE *SRP_VBASE_new(char *seed_key)
|
||||
return NULL;
|
||||
if ((vb->users_pwd = sk_SRP_user_pwd_new_null()) == NULL
|
||||
|| (vb->gN_cache = sk_SRP_gN_cache_new_null()) == NULL) {
|
||||
sk_SRP_user_pwd_free(vb->users_pwd);
|
||||
OPENSSL_free(vb);
|
||||
return NULL;
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user