Hi all,

On Sun, Jun 26, 2016 at 08:00:31PM +0200, Willy Tarreau wrote:
(...)
>   - BUG/MINOR: ssl: fix potential memory leak in ssl_sock_load_dh_params()

For those interested, we found a regression with this patch, some of our
processes crash with openssl-1.0.2 and dh-param 1024. Setting dh-param 2048
is enough to work around the issue.

Distro packagers will want to add commit 2706acc ("Revert "BUG/MINOR: ssl:
fix potential memory leak in ssl_sock_load_dh_params()"") to their patches
in order to fix this problem.

We'll have to issue 1.6.7 shortly (but let's wait for a few other reports
first).

Willy

Reply via email to