bugzilla-daemon at mindrot.org
2005-Nov-04 07:02 UTC
[Bug 1111] memory leak in openbsd-compat/getrrsetbyname.c, function: getrrsetbyname
http://bugzilla.mindrot.org/show_bug.cgi?id=1111 Summary: memory leak in openbsd-compat/getrrsetbyname.c, function: getrrsetbyname Product: Portable OpenSSH Version: 4.2p1 Platform: Other OS/Version: All Status: NEW Severity: normal Priority: P2 Component: ssh AssignedTo: bitbucket at mindrot.org ReportedBy: kremenek at cs.stanford.edu In the function getrrsetbyname... memory allocated by the call to parse_dns_response (which calls calloc): /* parse result */ response = parse_dns_response(answer, length); ... appears to be leaked on all paths in this function. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2005-Nov-05 04:46 UTC
[Bug 1111] memory leak in openbsd-compat/getrrsetbyname.c, function: getrrsetbyname
http://bugzilla.mindrot.org/show_bug.cgi?id=1111 djm at mindrot.org changed: What |Removed |Added ---------------------------------------------------------------------------- AssignedTo|bitbucket at mindrot.org |djm at mindrot.org Status|NEW |ASSIGNED ------- Comment #1 from djm at mindrot.org 2005-11-05 15:46 ------- Created an attachment (id=1023) --> (http://bugzilla.mindrot.org/attachment.cgi?id=1023&action=view) sync getrrsetbyname.c This can be resolved by syncing our compat code to OpenBSD's latest version of getrrsetbyname(), which already includes fixes for these leaks. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. You are the assignee for the bug, or are watching the assignee.
Reasonably Related Threads
- openbsd-compat/getrrsetbyname.c: answer buffer size too large for EDNS0 and glibc
- openssh-3.7.1p2 on HP-UX 10.20
- OpenSSH DNS resolution failure on IRIX 5.3: request to fix
- [Bug 1050] getrrsetbyname compat broken
- [Bug 1110] memory leak in bufaux.c, function: buffer_put_bignum_ret