Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:13559 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 72037 invoked by uid 1010); 27 Oct 2004 10:36:18 -0000 Delivered-To: ezmlm-scan-internals@lists.php.net Delivered-To: ezmlm-internals@lists.php.net Received: (qmail 71975 invoked from network); 27 Oct 2004 10:36:18 -0000 Received: from unknown (HELO out2.smtp.messagingengine.com) (66.111.4.26) by pb1.pair.com with SMTP; 27 Oct 2004 10:36:18 -0000 Received: from web1.messagingengine.com (web1.internal [10.202.2.210]) by frontend1.messagingengine.com (Postfix) with ESMTP id 8ED9EC34303; Wed, 27 Oct 2004 06:36:17 -0400 (EDT) Received: by web1.messagingengine.com (Postfix, from userid 99) id D96C01002; Wed, 27 Oct 2004 06:36:17 -0400 (EDT) Content-Disposition: inline Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset="iso-8859-1" MIME-Version: 1.0 X-Mailer: MIME::Lite 1.5 (F2.73; T1.001; A1.64; B3.05; Q3.03) To: wez@thebrainroom.com, internals@lists.php.net Date: Wed, 27 Oct 2004 03:36:17 -0700 X-Sasl-Enc: urkO4FI+OhsXOUxNjC47Ew 1098873377 Message-ID: <1098873377.30695.207361227@webmail.messagingengine.com> Subject: [PATCH] one more possible seg fault in openssl From: kameshj@fastmail.fm ("Kamesh Jayachandran") Hi Wez, "UK", "stateOrProvinceName" => "Somerset", "localityName" => "Glastonbury", "organizationName" => "The Brain Room Limited", "organizationalUnitName" => "PHP Documentation Team", "commonName" => "Wez Furlong", "emailAddress" => "wez@example.com" ); // Non-existent or null private key $csr = openssl_csr_new($dn, $privkey1); ?> will also cause the double free of privkey and hence potential seg fault. openssl_csr_new tries to create a fresh private key and adds to the resource list and fails to req.priv_key to null so the dispose function frees the private key generated. Later when the php_request_shutdown is called it agains frees the EG(regular_list) this causes the seg fault. Patch is available at, http://puggy.symonds.net/~kameshj/openssl.c.patch With regards Kamesh Jayachandran