https://bz.apache.org/bugzilla/show_bug.cgi?id=63077
--- Comment #3 from paolo <[email protected]> --- Created attachment 36498 --> https://bz.apache.org/bugzilla/attachment.cgi?id=36498&action=edit Proposed patch Hi, I could fix this leak by adding those lines in ssl_util_stapling.c static int stapling_cb(SSL *ssl, void *arg) ... if (rsp && ((ok == TRUE) || (mctx->stapling_return_errors == TRUE))) { ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, s, APLOGNO(01956) "stapling_cb: setting response"); if (!stapling_set_response(ssl, rsp)) + { + OCSP_RESPONSE_free(rsp); return SSL_TLSEXT_ERR_ALERT_FATAL; + } + OCSP_RESPONSE_free(rsp); return SSL_TLSEXT_ERR_OK; } ... -- You are receiving this mail because: You are the assignee for the bug. --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
