Hi all,
On Sun, Jun 26, 2016 at 08:00:31PM +0200, Willy Tarreau wrote:
(...)
> - BUG/MINOR: ssl: fix potential memory leak in ssl_sock_load_dh_params()
For those interested, we found a regression with this patch, some of our
processes crash with openssl-1.0.2 and dh-param 1024. Setting dh-param 2048
is enough to work around the issue.
Distro packagers will want to add commit 2706acc ("Revert "BUG/MINOR: ssl:
fix potential memory leak in ssl_sock_load_dh_params()"") to their patches
in order to fix this problem.
We'll have to issue 1.6.7 shortly (but let's wait for a few other reports
first).
Willy