From: <ad...@be...> - 2009-08-24 09:55:22
|
Bug #16171, was updated on 2009-Aug-24 04:27 Here is a current snapshot of the bug. Project: Community Fetchmail Category: None Status: Closed Resolution: Fixed Bug Group: None Priority: 5 Submitted by: marka Assigned to : none Summary: Bad xfree() call.. Details: --- socket.c.orig 2009-08-06 09:15:52.000000000 +1000 +++ socket.c 2009-08-24 11:59:30.000000000 +1000 @@ -628,9 +628,10 @@ report(stdout, GT_("Unknown Issuer CommonName\n")); } if ((i = X509_NAME_get_text_by_NID(subj, NID_commonName, buf, sizeof(buf))) != -1) { - if (outlevel >= O_VERBOSE) + if (outlevel >= O_VERBOSE) { report(stdout, GT_("Server CommonName: %s\n"), (tt = sdump(buf, i))); - xfree(tt); + xfree(tt); + } if ((size_t)i >= sizeof(buf) - 1) { /* Possible truncation. In this case, this is a DNS name, so this * is really bad. We do not tolerate this even in the non-strict case. */ Follow-Ups: Date: 2009-Aug-24 09:55 By: m-a Comment: Thanks. This is already fixed and announced: https://developer.berlios.de/project/shownotes.php?group_id=1824&release_id=16574 ------------------------------------------------------- For detailed info, follow this link: http://developer.berlios.de/bugs/?func=detailbug&bug_id=16171&group_id=1824 |