https://bz.apache.org/bugzilla/show_bug.cgi?id=63077

--- Comment #3 from paolo <[email protected]> ---
Created attachment 36498
  --> https://bz.apache.org/bugzilla/attachment.cgi?id=36498&action=edit
Proposed patch

Hi,

I could fix this leak by adding those lines in ssl_util_stapling.c

static int stapling_cb(SSL *ssl, void *arg)
...
    if (rsp && ((ok == TRUE) || (mctx->stapling_return_errors == TRUE))) {
        ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, s, APLOGNO(01956)
                     "stapling_cb: setting response");
        if (!stapling_set_response(ssl, rsp))
 +    {
 +        OCSP_RESPONSE_free(rsp);
            return SSL_TLSEXT_ERR_ALERT_FATAL;
 +     }
 +   OCSP_RESPONSE_free(rsp);
        return SSL_TLSEXT_ERR_OK;
    }
...

-- 
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to