Hello,

> Example for OpenSSL-1.0.0-beta3:
> Result: 0, and memory leak:
> Minimal patch for OpenSSL-1.0.0-beta3 attached.

openssl-1.0.0-beta4 (OpenSSL 1.0.0-beta4 10 Nov 2009) : Return 0, and
memory leak:

==22183== 296 (168 direct, 128 indirect) bytes in 1 blocks are
definitely lost in loss record 9 of 9
==22183==    at 0x4C24E13: malloc
==22183==    by 0x40898D: CRYPTO_malloc
==22183==    by 0x4171F9: RSA_new
==22183==    by 0x41767C: rsa_cb
==22183==    by 0x402B1E: asn1_item_ex_combine_new
==22183==    by 0x4059B8: ASN1_item_ex_d2i
==22183==    by 0x406013: ASN1_item_d2i
==22183==    by 0x4026A4: d2i_PublicKey
==22183==    by 0x401A90: main
==22183==
==22183== LEAK SUMMARY:
==22183==    definitely lost: 168 bytes in 1 blocks

openssl-1.0.0-stable-SNAP-20091112 (OpenSSL 1.0.0-beta4 10 Nov 2009) : 
Return 0, and memory leak:

==31472== 296 (168 direct, 128 indirect) bytes in 1 blocks are
definitely lost in loss record 9 of 9
==31472==    at 0x4C24E13: malloc
==31472==    by 0x40898D: CRYPTO_malloc
==31472==    by 0x4171F9: RSA_new
==31472==    by 0x41767C: rsa_cb
==31472==    by 0x402B1E: asn1_item_ex_combine_new
==31472==    by 0x4059B8: ASN1_item_ex_d2i
==31472==    by 0x406013: ASN1_item_d2i
==31472==    by 0x4026A4: d2i_PublicKey
==31472==    by 0x401A90: main
==31472==
==31472== LEAK SUMMARY:
==31472==    definitely lost: 168 bytes in 1 blocks

openssl-SNAP-20091112 (OpenSSL 1.1.0-dev xx XXX xxxx) : Return 0, and 
memory leak:

==7782== 296 (168 direct, 128 indirect) bytes in 1 blocks are definitely
lost in loss record 9 of 9
==7782==    at 0x4C24E13: malloc
==7782==    by 0x408A0D: CRYPTO_malloc
==7782==    by 0x417279: RSA_new
==7782==    by 0x4176FC: rsa_cb
==7782==    by 0x402B9E: asn1_item_ex_combine_new
==7782==    by 0x405A38: ASN1_item_ex_d2i
==7782==    by 0x406093: ASN1_item_d2i
==7782==    by 0x402724: d2i_PublicKey
==7782==    by 0x401B10: main
==7782==
==7782== LEAK SUMMARY:
==7782==    definitely lost: 168 bytes in 1 blocks

Also current CVN 
(http://cvs.openssl.org/fileview?f=openssl/crypto/asn1/d2i_pu.c&v=1.18) 
have this bug.

Is this not a bug?
Or is this patch incorrect? (it is still suitable for the current branch)


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [email protected]

Reply via email to