Preetish Amballi
2024-Oct-25 14:14 UTC
[PATCH] Memory leak fixed - when lauched as non-root user When we lauch sshd as non-root user, its still able to load public keys but fails to load private keys. So before exiting free the memory allocated for the public key
--- sshd.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/sshd.c b/sshd.c index dda8d9b77..cbdced5db 100644 --- a/sshd.c +++ b/sshd.c @@ -1533,6 +1533,8 @@ main(int ac, char **av) } else { do_log2(ll, "Unable to load host key: %s", options.host_key_files[i]); + sshkey_free(pubkey); + pubkey = NULL; sensitive_data.host_keys[i] = NULL; sensitive_data.host_pubkeys[i] = NULL; continue; -- 2.45.2
Preetish Amballi
2024-Nov-02 14:21 UTC
[PATCH] Memory leak fixed - when lauched as non-root user When we lauch sshd as non-root user, its still able to load public keys but fails to load private keys. So before exiting free the memory allocated for the public key
Hi Team, Any update on this patch? Regards, Preetish On Fri, 25 Oct 2024 at 19:44, Preetish Amballi <amballip at gmail.com> wrote:> --- > sshd.c | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/sshd.c b/sshd.c > index dda8d9b77..cbdced5db 100644 > --- a/sshd.c > +++ b/sshd.c > @@ -1533,6 +1533,8 @@ main(int ac, char **av) > } else { > do_log2(ll, "Unable to load host key: %s", > options.host_key_files[i]); > + sshkey_free(pubkey); > + pubkey = NULL; > sensitive_data.host_keys[i] = NULL; > sensitive_data.host_pubkeys[i] = NULL; > continue; > -- > 2.45.2 > >