| Summary: | memory leak in bufaux.c, function: buffer_put_bignum_ret | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Ted Kremenek <kremenek> | ||||
| Component: | ssh | Assignee: | Damien Miller <djm> | ||||
| Status: | CLOSED FIXED | ||||||
| Severity: | normal | ||||||
| Priority: | P2 | ||||||
| Version: | 4.2p1 | ||||||
| Hardware: | Other | ||||||
| OS: | All | ||||||
| Bug Depends on: | |||||||
| Bug Blocks: | 1047 | ||||||
| Attachments: |
|
||||||
Created attachment 1024 [details]
fix
I'll commit this soon
fix applied and will be in 4.3, thanks for the report. Change all RESOLVED bug to CLOSED with the exception of the ones fixed post-4.4. |
In buffer_put_bignum_ret... Memory allocated at: u_char *buf = xmalloc(bin_size); is leaked on the following error path: if (oi != bin_size) { ... [ LEAK ]