Bugzilla – Attachment 1369 Details for
Bug 1379
memory leak in process_cmdline()
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
[patch]
fixed version of the patch. The previous one wasn't complete.
process_cmdline-FIXED.patch (text/plain), 523 bytes, created by
Jan Pechanec
on 2007-10-24 00:32:23 AEST
(
hide
)
Description:
fixed version of the patch. The previous one wasn't complete.
Filename:
MIME Type:
Creator:
Jan Pechanec
Created:
2007-10-24 00:32:23 AEST
Size:
523 bytes
patch
obsolete
>--- clientloop.c Wed Aug 15 11:13:42 2007 >+++ clientloop.c.new Tue Oct 23 16:24:48 2007 >@@ -940,6 +940,8 @@ > u_short cancel_port; > Forward fwd; > >+ memset(&fwd, 0, sizeof(fwd)); >+ > leave_raw_mode(); > handler = signal(SIGINT, SIG_IGN); > cmd = s = read_passphrase("\r\nssh> ", RP_ECHO); >@@ -1039,6 +1041,10 @@ > enter_raw_mode(); > if (cmd) > xfree(cmd); >+ if (fwd.listen_host != NULL) >+ xfree(fwd.listen_host); >+ if (fwd.connect_host != NULL) >+ xfree(fwd.connect_host); > } > > /* process the characters one by one */
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 1379
:
1366
| 1369