Skip to content

Commit a6f9494

Browse files
Tom Atkinsonshigeki
Tom Atkinson
authored andcommitted
crypto: fix memory leak if certificate is revoked
The additional validity checks applied to StartCom and WoSign certificates failed to free memory before returning. Refs: #9469 Fixes: #12033 PR-URL: #12089 Reviewed-By: Sam Roberts <[email protected]> Reviewed-By: Fedor Indutny <[email protected]> Reviewed-By: Ben Noordhuis <[email protected]> Reviewed-By: Myles Borins <[email protected]> Reviewed-By: Shigeki Ohtsu <[email protected]> Reviewed-By: Colin Ihrig <[email protected]>
1 parent fd18243 commit a6f9494

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

src/node_crypto.cc

+6-2
Original file line numberDiff line numberDiff line change
@@ -2785,7 +2785,9 @@ inline bool CertIsStartComOrWoSign(X509_NAME* name) {
27852785
startcom_wosign_data = dn.data;
27862786
startcom_wosign_name = d2i_X509_NAME(nullptr, &startcom_wosign_data,
27872787
dn.len);
2788-
if (X509_NAME_cmp(name, startcom_wosign_name) == 0)
2788+
int cmp = X509_NAME_cmp(name, startcom_wosign_name);
2789+
X509_NAME_free(startcom_wosign_name);
2790+
if (cmp == 0)
27892791
return true;
27902792
}
27912793

@@ -2830,8 +2832,10 @@ inline CheckResult CheckWhitelistedServerCert(X509_STORE_CTX* ctx) {
28302832
}
28312833

28322834
X509* leaf_cert = sk_X509_value(chain, 0);
2833-
if (!CheckStartComOrWoSign(root_name, leaf_cert))
2835+
if (!CheckStartComOrWoSign(root_name, leaf_cert)) {
2836+
sk_X509_pop_free(chain, X509_free);
28342837
return CHECK_CERT_REVOKED;
2838+
}
28352839

28362840
// When the cert is issued from either CNNNIC ROOT CA or CNNNIC EV
28372841
// ROOT CA, check a hash of its leaf cert if it is in the whitelist.

0 commit comments

Comments
 (0)