]> git.kaiwu.me - haproxy.git/commit
BUG/MINOR: ssl: Memory leak of DH BIGNUM fields
authorRemi Tricot-Le Breton <rlebreton@haproxy.com>
Thu, 3 Nov 2022 14:16:47 +0000 (15:16 +0100)
committerWilliam Lallemand <wlallemand@haproxy.org>
Fri, 4 Nov 2022 10:40:29 +0000 (11:40 +0100)
commita2c21db155f52089b9474e9a13a8b270f55301b7
treea3689a1b9fc31cc461c2fc4a3f3a3fdceee9bcec
parenta2ec192de38eba294189bf94b76dbb2c4cf9a55b
BUG/MINOR: ssl: Memory leak of DH BIGNUM fields

When running HAProxy with OpenSSLv3, the two BIGNUMs used to build our
own DH parameters are not freed. It was not necessary previously because
ownership of those parameters was transferred to OpenSSL through the
DH_set0_pqg call.

This patch should be backported to 2.6.
src/ssl_sock.c