bugzilla-daemon at mindrot.org
2005-Nov-04 06:53 UTC
[Bug 1110] memory leak in bufaux.c, function: buffer_put_bignum_ret
http://bugzilla.mindrot.org/show_bug.cgi?id=1110 Summary: memory leak in bufaux.c, function: buffer_put_bignum_ret Product: Portable OpenSSH Version: 4.2p1 Platform: Other OS/Version: All Status: NEW Severity: normal Priority: P2 Component: ssh AssignedTo: bitbucket at mindrot.org ReportedBy: kremenek at cs.stanford.edu In buffer_put_bignum_ret... Memory allocated at: u_char *buf = xmalloc(bin_size); is leaked on the following error path: if (oi != bin_size) { ... [ LEAK ] ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2005-Nov-05 04:51 UTC
[Bug 1110] memory leak in bufaux.c, function: buffer_put_bignum_ret
http://bugzilla.mindrot.org/show_bug.cgi?id=1110 djm at mindrot.org changed: What |Removed |Added ---------------------------------------------------------------------------- AssignedTo|bitbucket at mindrot.org |djm at mindrot.org Status|NEW |ASSIGNED ------- Comment #1 from djm at mindrot.org 2005-11-05 15:51 ------- Created an attachment (id=1024) --> (http://bugzilla.mindrot.org/attachment.cgi?id=1024&action=view) fix I'll commit this soon ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. You are the assignee for the bug, or are watching the assignee.
Maybe Matching Threads
- [Bug 1109] Memory leak in file: bufaux.c, function: buffer_get_bignum2_ret
- [Bug 1111] memory leak in openbsd-compat/getrrsetbyname.c, function: getrrsetbyname
- OpenSSH Security Advisory (adv.token)
- OpenSSH Security Advisory (adv.token)
- ssh-keygen private keys export - new feature