[pkg-fetchmail-maint] Bug#688015: [PATCH] Re: Bug#688015: memory leak

Matthias Andree matthias.andree at gmx.de
Fri Dec 14 00:01:27 UTC 2012


Now that was a useful pointer, thanks a bunch!

We have had this leak ever since the subjectAltName support was added in
2005 (fetchmail 6.2.9)... it strikes whenever we manage to extract these
fields from a certificate while verifying it.

This bug only hurts in daemon mode, because the leak accumulates only then.

Can either of the reporters see and report back if the attached patch
improves the situation for you?

-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0001-Plug-a-memory-leak-in-OpenSSL-s-certificate-verifica.patch
Type: text/x-patch
Size: 1017 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/pkg-fetchmail-maint/attachments/20121214/9e5e5ca9/attachment.bin>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: OpenPGP digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-fetchmail-maint/attachments/20121214/9e5e5ca9/attachment.pgp>


More information about the pkg-fetchmail-maint mailing list