| Summary: | memleak in do_gen_krl() | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Arthur Mesh <arthurmesh> | ||||||||
| Component: | ssh-keygen | Assignee: | Damien Miller <djm> | ||||||||
| Status: | CLOSED FIXED | ||||||||||
| Severity: | minor | ||||||||||
| Priority: | P5 | ||||||||||
| Version: | 6.2p1 | ||||||||||
| Hardware: | All | ||||||||||
| OS: | FreeBSD | ||||||||||
| Bug Depends on: | |||||||||||
| Bug Blocks: | 2076 | ||||||||||
| Attachments: |
|
||||||||||
Created attachment 2241 [details]
potential fix for both leaks
Found another leak. Instead of opening another defect, I'll submit it as part of this one.
Created attachment 2250 [details]
fix leaks, checking for NULL before key_free()
You need to check whether ca was actually loaded, as key_free() will fatal() if not.
applied. Thanks! Close all resolved bugs after 7.3p1 release |
Created attachment 2240 [details] potential fix ca is not properly freed.