https://bugs.openldap.org/show_bug.cgi?id=9696
Howard Chu <[email protected]> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|UNCONFIRMED |RESOLVED Resolution|--- |TEST --- Comment #1 from Howard Chu <[email protected]> --- (In reply to [email protected] from comment #0) > The OpenSSL implementation of ldap_get_option() LDAP_OPT_X_TLS_PEERCERT > leaks memory. The internal function tlso_session_peercert() uses > SSL_get_peer_certificate() to access the server certificate. > SSL_get_peer_certificate() increases the reference counter of the peer cert > by one. The code is missing a X509_free() call to decref the internal > reference counter by one. > > I also recommend that you check the return value of > SSL_get_peer_certificate() for NULL. There are cases when a TLS session does > not have access to a peer certificate, e.g. session resumption. Thanks for the report. Fixed in git master -- You are receiving this mail because: You are on the CC list for the issue.
