Displaying 20 results from an estimated 10000 matches similar to: "[Bug 1967] Potential memory leak in ssh [detected by melton]"
2015 Jun 05
0
[Bug 1967] Potential memory leak in ssh [detected by melton]
https://bugzilla.mindrot.org/show_bug.cgi?id=1967
--- Comment #17 from Damien Miller <djm at mindrot.org> ---
Comment on attachment 2124
--> https://bugzilla.mindrot.org/attachment.cgi?id=2124
fix memory leaks
I think there is nothing left to do here:
>--- mux.c 18 Dec 2011 23:52:21 -0000 1.35
>+++ mux.c 30 Dec 2011 09:19:51 -0000
All committed
>Index: readconf.c
2013 Jul 25
1
[Bug 1967] Potential memory leak in ssh [detected by melton]
https://bugzilla.mindrot.org/show_bug.cgi?id=1967
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Blocks| |2130
--- Comment #7 from Damien Miller <djm at mindrot.org> ---
Retarget to openssh-6.4
--
You are receiving
2013 Jun 04
0
[Bug 1969] Potential memory leak in sshd [Detected by melton]
https://bugzilla.mindrot.org/show_bug.cgi?id=1969
Darren Tucker <dtucker at zip.com.au> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |dtucker at zip.com.au
Blocks| |2076
--- Comment #1 from Darren Tucker
2014 Feb 05
0
[Bug 1967] Potential memory leak in ssh [detected by melton]
https://bugzilla.mindrot.org/show_bug.cgi?id=1967
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Blocks| |2188
--- Comment #9 from Damien Miller <djm at mindrot.org> ---
Retarget incomplete bugs / feature requests to
2014 Apr 12
0
[Bug 1967] Potential memory leak in ssh [detected by melton]
https://bugzilla.mindrot.org/show_bug.cgi?id=1967
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Blocks| |2226
--- Comment #11 from Damien Miller <djm at mindrot.org> ---
Retarget to 6.7 release, since 6.6 was mostly
2014 Aug 29
0
[Bug 1967] Potential memory leak in ssh [detected by melton]
https://bugzilla.mindrot.org/show_bug.cgi?id=1967
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Blocks| |2266
--- Comment #13 from Damien Miller <djm at mindrot.org> ---
Retarget incomplete bugs to 6.8 release.
--
2015 Mar 02
0
[Bug 1967] Potential memory leak in ssh [detected by melton]
https://bugzilla.mindrot.org/show_bug.cgi?id=1967
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Blocks|2266 |
--- Comment #15 from Damien Miller <djm at mindrot.org> ---
OpenSSH 6.8 is approaching release and closed for
2015 Mar 02
0
[Bug 1967] Potential memory leak in ssh [detected by melton]
https://bugzilla.mindrot.org/show_bug.cgi?id=1967
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Blocks| |2360
--- Comment #16 from Damien Miller <djm at mindrot.org> ---
Retarget to 6.9
--
You are receiving this
2015 Jun 05
0
[Bug 1967] Potential memory leak in ssh [detected by melton]
https://bugzilla.mindrot.org/show_bug.cgi?id=1967
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Resolution|--- |FIXED
Status|NEW |RESOLVED
CC| |djm
2015 Aug 11
0
[Bug 1967] Potential memory leak in ssh [detected by melton]
https://bugzilla.mindrot.org/show_bug.cgi?id=1967
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |CLOSED
--- Comment #18 from Damien Miller <djm at mindrot.org> ---
Set all RESOLVED bugs to CLOSED with
2012 Feb 04
8
Potential memory leak in sshd [detected by melton]
Hi all,
After the memory leaks (bug 1967
<https://bugzilla.mindrot.org/show_bug.cgi?id=1967>) I reported in
bugzilla are fixed,
I also applied melton(http://lcs.ios.ac.cn/~xuzb/melton.html)
to detect the potential bugs in sshd (openssh-5.9p1).
The url below is the index of bug reports that are checked as real
bugs manually.
2013 Jul 25
1
[Bug 1969] Potential memory leak in sshd [Detected by melton]
https://bugzilla.mindrot.org/show_bug.cgi?id=1969
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Blocks| |2130
--- Comment #2 from Damien Miller <djm at mindrot.org> ---
Retarget to openssh-6.4
--
You are receiving
2013 Dec 19
0
[Bug 1969] Potential memory leak in sshd [Detected by melton]
https://bugzilla.mindrot.org/show_bug.cgi?id=1969
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
CC| |djm at mindrot.org
Resolution|---
2015 Aug 11
0
[Bug 1969] Potential memory leak in sshd [Detected by melton]
https://bugzilla.mindrot.org/show_bug.cgi?id=1969
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |CLOSED
--- Comment #5 from Damien Miller <djm at mindrot.org> ---
Set all RESOLVED bugs to CLOSED with release
2011 Dec 30
7
[Bug 1967] New: Potential memory leak
https://bugzilla.mindrot.org/show_bug.cgi?id=1967
Bug #: 1967
Summary: Potential memory leak
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.9p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs at
2018 Jun 08
2
vanilla build of 7.7p1 release on linux/4.17 fails with gcc8 @ "/usr/bin/ld: unrecognized option '-Wl,-z,retpolineplt'"
On Thu, Jun 07, 2018 at 06:14:42PM -0700, PGNet Dev wrote:
> On 6/7/18 6:08 PM, Darren Tucker wrote:
> > Well the intent is you should be able to set CC and LD to whatever you
> > want as long as they work. In this case, the OSSH_CHECK_LDFLAG_LINK
> > test invokes autoconf's AC_LINK_IFELSE with uses CC not LD. I'm not
> > sure what to do about it yet though.
I
2018 Jun 08
2
vanilla build of 7.7p1 release on linux/4.17 fails with gcc8 @ "/usr/bin/ld: unrecognized option '-Wl,-z,retpolineplt'"
On 8 June 2018 at 12:09, PGNet Dev <pgnet.dev at gmail.com> wrote:
[...]
> /usr/bin/ld -o ssh ssh.o readconf.o clientloop.o sshtty.o sshconnect.o sshconnect2.o mux.o -L. -Lopenbsd-compat/ -Wl,-z,relro -Wl,-z,now -Wl,-z,noexecstack -fstack-protector-strong -pie -lssh -lopenbsd-compat -lutil -lz -lcrypt -lresolv
> /usr/bin/ld: unrecognized option
2013 Apr 01
1
"no such identity"
With an OpenSSH 6.2p1 client with stock ssh_config and one of the
following cases:
- I don't have any client keys
- I have one or more client keys, but not one of each type
- I don't have an authorized_keys on the server
- I have an authorized_keys on the server, but it does not list any of
the keys I have
- One of my client keys is listed, but I don't have an agent and
2018 Jun 08
3
vanilla build of 7.7p1 release on linux/4.17 fails with gcc8 @ "/usr/bin/ld: unrecognized option '-Wl,-z,retpolineplt'"
One difference I notice is that in your failing example you are
invoking /usr/bin/ld directly to link:
/usr/bin/ld -o ssh ssh.o readconf.o clientloop.o
sshtty.o sshconnect.o sshconnect2.o mux.o -L. -Lopenbsd-compat/
-Wl,-z,retpolineplt -Wl,-z,relro -Wl,-z,now -Wl,-z,noexecstack
-fstack-protector-strong -pie -lssh -lopenbsd-compat -lutil -lz
-lcrypt -lresolv
whereas my example is
2018 Jun 08
2
vanilla build of 7.7p1 release on linux/4.17 fails with gcc8 @ "/usr/bin/ld: unrecognized option '-Wl,-z,retpolineplt'"
Also what exact distro and version are you having the problem on and
what version of ld does it have?
Mine is
$ ld --version
GNU ld version 2.29.1-23.fc28
--
Darren Tucker (dtucker at dtucker.net)
GPG key 11EAA6FA / A86E 3E07 5B19 5880 E860 37F4 9357 ECEF 11EA A6FA (new)
Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.