mirror of
https://github.com/openssl/openssl.git
synced 2024-12-15 06:01:37 +08:00
64954e2f34
This fixes a race condition where the index to the cache location was found under a read lock and a later write lock set the cache entry. The issue being that two threads could get the same location index and then fight each other over writing the cache entry. The most likely outcome is a memory leak, however it would be possible to set up an invalid cache entry. The operation cache was a fixed sized array, once full an assertion failed. The other fix here is to convert this to a stack. The code is simplified and it avoids a cache overflow condition. Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14062) |
||
---|---|---|
.. | ||
cms_add1_signing_cert.pod | ||
evp_generic_fetch.pod | ||
evp_keymgmt_newdata.pod | ||
evp_keymgmt_util_export_to_provider.pod | ||
evp_pkey_export_to_provider.pod | ||
evp_pkey_get1_ED25519.pod | ||
OPENSSL_SA.pod | ||
ossl_algorithm_do_all.pod | ||
ossl_cmp_asn1_octet_string_set1.pod | ||
ossl_cmp_certreq_new.pod | ||
ossl_cmp_ctx_set1_caPubs.pod | ||
ossl_cmp_hdr_init.pod | ||
ossl_cmp_mock_srv_new.pod | ||
ossl_cmp_msg_check_update.pod | ||
ossl_cmp_msg_create.pod | ||
ossl_cmp_msg_protect.pod | ||
ossl_cmp_pkisi_get_status.pod | ||
ossl_cmp_print_log.pod | ||
ossl_cmp_X509_STORE_add1_certs.pod | ||
OSSL_DEPRECATED.pod | ||
ossl_DER_w_begin_sequence.pod | ||
ossl_DER_w_bn.pod | ||
ossl_DER_w_precompiled.pod | ||
ossl_ends_with_dirsep.pod | ||
ossl_init_thread_deregister.pod | ||
ossl_lib_ctx_get_data.pod | ||
ossl_method_construct.pod | ||
OSSL_METHOD_STORE.pod | ||
ossl_namemap_new.pod | ||
ossl_provider_add_conf_module.pod | ||
ossl_provider_new.pod | ||
ossl_punycode_decode.pod | ||
ossl_rand_get_entropy.pod | ||
ossl_random_add_conf_module.pod | ||
ossl_rsa_get0_all_params.pod | ||
x509v3_cache_extensions.pod |