diff options
author | steve <steve> | 2012-02-28 14:47:02 +0000 |
---|---|---|
committer | steve <steve> | 2012-02-28 14:47:02 +0000 |
commit | 872a0b0abca89d30666009c56b69f6b0d57b1581 (patch) | |
tree | 13a563bc2c132c2d436e8b6fbe981d3feeedcf44 | |
parent | 2e649cacdb781de9399e55f4d3fbde22d82ce6b7 (diff) | |
download | openssl-872a0b0abca89d30666009c56b69f6b0d57b1581.tar.gz |
Fix memory leak cause by race condition when creating public keys.
Thanks to Ivan Nestlerode <inestlerode@us.ibm.com> for reporting this bug.
-rw-r--r-- | crypto/asn1/x_pubkey.c | 11 |
1 files changed, 10 insertions, 1 deletions
diff --git a/crypto/asn1/x_pubkey.c b/crypto/asn1/x_pubkey.c index d42b6a2c5..627ec87f9 100644 --- a/crypto/asn1/x_pubkey.c +++ b/crypto/asn1/x_pubkey.c @@ -171,7 +171,16 @@ EVP_PKEY *X509_PUBKEY_get(X509_PUBKEY *key) goto error; } - key->pkey = ret; + /* Check to see if another thread set key->pkey first */ + CRYPTO_w_lock(CRYPTO_LOCK_EVP_PKEY); + if (key->pkey) + { + EVP_PKEY_free(ret); + ret = key->pkey; + } + else + key->pkey = ret; + CRYPTO_w_unlock(CRYPTO_LOCK_EVP_PKEY); CRYPTO_add(&ret->references, 1, CRYPTO_LOCK_EVP_PKEY); return ret; |