bugzilla-daemon at mindrot.org
2005-Nov-04 06:53 UTC
[Bug 1110] memory leak in bufaux.c, function: buffer_put_bignum_ret
http://bugzilla.mindrot.org/show_bug.cgi?id=1110
Summary: memory leak in bufaux.c, function: buffer_put_bignum_ret
Product: Portable OpenSSH
Version: 4.2p1
Platform: Other
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: bitbucket at mindrot.org
ReportedBy: kremenek at cs.stanford.edu
In buffer_put_bignum_ret...
Memory allocated at:
u_char *buf = xmalloc(bin_size);
is leaked on the following error path:
if (oi != bin_size) {
... [ LEAK ]
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2005-Nov-05 04:51 UTC
[Bug 1110] memory leak in bufaux.c, function: buffer_put_bignum_ret
http://bugzilla.mindrot.org/show_bug.cgi?id=1110
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
AssignedTo|bitbucket at mindrot.org |djm at mindrot.org
Status|NEW |ASSIGNED
------- Comment #1 from djm at mindrot.org 2005-11-05 15:51 -------
Created an attachment (id=1024)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=1024&action=view)
fix
I'll commit this soon
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
You are the assignee for the bug, or are watching the assignee.
Reasonably Related Threads
- [Bug 1109] Memory leak in file: bufaux.c, function: buffer_get_bignum2_ret
- [Bug 1111] memory leak in openbsd-compat/getrrsetbyname.c, function: getrrsetbyname
- OpenSSH Security Advisory (adv.token)
- OpenSSH Security Advisory (adv.token)
- ssh-keygen private keys export - new feature