From: <ad...@be...> - 2009-08-24 04:27:16
|
Bug #16171, was updated on 2009-Aug-24 12:27 Here is a current snapshot of the bug. Project: Community Fetchmail Category: None Status: Open Resolution: None Bug Group: None Priority: 5 Submitted by: marka Assigned to : none Summary: Bad xfree() call.. Details: --- socket.c.orig 2009-08-06 09:15:52.000000000 +1000 +++ socket.c 2009-08-24 11:59:30.000000000 +1000 @@ -628,9 +628,10 @@ report(stdout, GT_("Unknown Issuer CommonName\n")); } if ((i = X509_NAME_get_text_by_NID(subj, NID_commonName, buf, sizeof(buf))) != -1) { - if (outlevel >= O_VERBOSE) + if (outlevel >= O_VERBOSE) { report(stdout, GT_("Server CommonName: %s\n"), (tt = sdump(buf, i))); - xfree(tt); + xfree(tt); + } if ((size_t)i >= sizeof(buf) - 1) { /* Possible truncation. In this case, this is a DNS name, so this * is really bad. We do not tolerate this even in the non-strict case. */ For detailed info, follow this link: http://developer.berlios.de/bugs/?func=detailbug&bug_id=16171&group_id=1824 |