Fix memory leak when rejecting bogus DH parameters.
authorTom Lane <[email protected]>
Sat, 20 Mar 2021 16:47:21 +0000 (12:47 -0400)
committerTom Lane <[email protected]>
Sat, 20 Mar 2021 16:47:21 +0000 (12:47 -0400)
While back-patching e0e569e1d, I noted that there were some other
places where we ought to be applying DH_free(); namely, where we
load some DH parameters from a file and then reject them as not
being sufficiently secure.  While it seems really unlikely that
anybody would hit these code paths in production, let alone do
so repeatedly, let's fix it for consistency.

Back-patch to v10 where this code was introduced.

Discussion: https://postgr.es/m/16160-18367e56e9a28264@postgresql.org

src/backend/libpq/be-secure-openssl.c

index ad33122e0ed08e44e37fc465176ae69234797b85..5ce3f27855e7b872ac954d8e518dd38276f8759e 100644 (file)
@@ -922,6 +922,7 @@ load_dh_file(char *filename, bool isServerStart)
                (errcode(ERRCODE_CONFIG_FILE_ERROR),
                 errmsg("invalid DH parameters: %s",
                        SSLerrmessage(ERR_get_error()))));
+       DH_free(dh);
        return NULL;
    }
    if (codes & DH_CHECK_P_NOT_PRIME)
@@ -929,6 +930,7 @@ load_dh_file(char *filename, bool isServerStart)
        ereport(isServerStart ? FATAL : LOG,
                (errcode(ERRCODE_CONFIG_FILE_ERROR),
                 errmsg("invalid DH parameters: p is not prime")));
+       DH_free(dh);
        return NULL;
    }
    if ((codes & DH_NOT_SUITABLE_GENERATOR) &&
@@ -937,6 +939,7 @@ load_dh_file(char *filename, bool isServerStart)
        ereport(isServerStart ? FATAL : LOG,
                (errcode(ERRCODE_CONFIG_FILE_ERROR),
                 errmsg("invalid DH parameters: neither suitable generator or safe prime")));
+       DH_free(dh);
        return NULL;
    }