From f64a05979d1f744d1726755f4ee9adb5580adef7 Mon Sep 17 00:00:00 2001 From: Remi Tricot-Le Breton Date: Mon, 13 Mar 2023 15:56:33 +0100 Subject: [PATCH] BUG/MINOR: ssl: Fix double free in ocsp update deinit If the last update before a deinit happens was successful, the pointer to the httpclient in the ocsp update context was not reset while the httpclient instance was already destroyed. --- src/ssl_ocsp.c | 1 + 1 file changed, 1 insertion(+) diff --git a/src/ssl_ocsp.c b/src/ssl_ocsp.c index c34868102..14fb7e915 100644 --- a/src/ssl_ocsp.c +++ b/src/ssl_ocsp.c @@ -1273,6 +1273,7 @@ static struct task *ssl_ocsp_update_responses(struct task *task, void *context, } if (hc) httpclient_stop_and_destroy(hc); + ctx->hc = NULL; free_trash_chunk(req_url); free_trash_chunk(req_body); task->expire = tick_add(now_ms, next_wakeup);