Bugzilla – Attachment 1025 Details for
Bug 1109
Memory leak in file: bufaux.c, function: buffer_get_bignum2_ret
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
[patch]
fix
sshleaks.diff (text/plain), 625 bytes, created by
Damien Miller
on 2005-11-05 15:53:39 AEDT
(
hide
)
Description:
fix
Filename:
MIME Type:
Creator:
Damien Miller
Created:
2005-11-05 15:53:39 AEDT
Size:
625 bytes
patch
obsolete
>Index: bufaux.c >=================================================================== >RCS file: /cvs/src/usr.bin/ssh/bufaux.c,v >retrieving revision 1.36 >diff -u -p -r1.36 bufaux.c >--- bufaux.c 17 Jun 2005 02:44:32 -0000 1.36 >+++ bufaux.c 5 Nov 2005 04:25:26 -0000 >@@ -187,10 +188,12 @@ buffer_get_bignum2_ret(Buffer *buffer, B > > if (len > 0 && (bin[0] & 0x80)) { > error("buffer_get_bignum2_ret: negative numbers not supported"); >+ xfree(bin); > return (-1); > } > if (len > 8 * 1024) { > error("buffer_get_bignum2_ret: cannot handle BN of size %d", len); >+ xfree(bin); > return (-1); > } > BN_bin2bn(bin, len, value);
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 1109
: 1025