Fix memory leak in OpenSSL::SSL::Socket#peer_certificate
#13785
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
While opening lots of HTTPS connections (from Heii On-Call outbound prober processes for website monitoring / alerting), I discovered a substantial memory leak. This memory leak causes our processes to hit their memory limits and restart several times per day. I traced the leak down to a call to
OpenSSL::SSL::Socket#peer_certificate
, which we recently started using to inspect SSL certificate expiry dates, so we can warn our users about soon-to-expire certificates.As per https://www.openssl.org/docs/man3.1/man3/SSL_get1_peer_certificate.html :
The attached fix ensures that the raw
LibCrypto::X509
certificate is freed withLibCrypto.x509_free
after it isLibCrypto.x509_dup
'd into a newOpenSSL::X509::Certificate
instance within theOpenSSL::X509::Certificate
constructor.Running with this change monkeypatched does fix our memory leak. 😄