]> git.ipfire.org Git - thirdparty/haproxy.git/commit
BUG/MINOR: ssl: fix potential memory leak in ssl_sock_load_dh_params()
authorRemi Gacogne <rgacogne-github@coredump.fr>
Sat, 2 Jul 2016 14:26:10 +0000 (16:26 +0200)
committerWilly Tarreau <w@1wt.eu>
Tue, 12 Jul 2016 09:48:06 +0000 (11:48 +0200)
commitc7e12637df094630c4d39ed9457d8b927023e75d
tree82f714c41ad0bdadfb1c90423965acd0e47fcb74
parent8e48b8745eaabdad100ade1ca4fb13c6154fab4b
BUG/MINOR: ssl: fix potential memory leak in ssl_sock_load_dh_params()

Roberto Guimaraes reported that Valgrind complains about a leak
in ssl_get_dh_1024().
This is caused caused by an oversight in ssl_sock_load_dh_params(),
where local_dh_1024 is always replaced by a new DH object even if
it already holds one. This patch simply checks whether local_dh_1024
is NULL before calling ssl_get_dh_1024().
src/ssl_sock.c