bugzilla-daemon at mindrot.org
2005-Nov-04 07:02 UTC
[Bug 1111] memory leak in openbsd-compat/getrrsetbyname.c, function: getrrsetbyname
http://bugzilla.mindrot.org/show_bug.cgi?id=1111
Summary: memory leak in openbsd-compat/getrrsetbyname.c,
function: getrrsetbyname
Product: Portable OpenSSH
Version: 4.2p1
Platform: Other
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: bitbucket at mindrot.org
ReportedBy: kremenek at cs.stanford.edu
In the function getrrsetbyname...
memory allocated by the call to parse_dns_response (which calls calloc):
/* parse result */
response = parse_dns_response(answer, length);
... appears to be leaked on all paths in this function.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2005-Nov-05 04:46 UTC
[Bug 1111] memory leak in openbsd-compat/getrrsetbyname.c, function: getrrsetbyname
http://bugzilla.mindrot.org/show_bug.cgi?id=1111
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
AssignedTo|bitbucket at mindrot.org |djm at mindrot.org
Status|NEW |ASSIGNED
------- Comment #1 from djm at mindrot.org 2005-11-05 15:46 -------
Created an attachment (id=1023)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=1023&action=view)
sync getrrsetbyname.c
This can be resolved by syncing our compat code to OpenBSD's latest version
of
getrrsetbyname(), which already includes fixes for these leaks.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
You are the assignee for the bug, or are watching the assignee.
Seemingly Similar Threads
- openbsd-compat/getrrsetbyname.c: answer buffer size too large for EDNS0 and glibc
- openssh-3.7.1p2 on HP-UX 10.20
- OpenSSH DNS resolution failure on IRIX 5.3: request to fix
- [Bug 1050] getrrsetbyname compat broken
- [Bug 1110] memory leak in bufaux.c, function: buffer_put_bignum_ret