Bug 1110 - memory leak in bufaux.c, function: buffer_put_bignum_ret
Summary: memory leak in bufaux.c, function: buffer_put_bignum_ret
Status: CLOSED FIXED
Alias: None
Product: Portable OpenSSH
Classification: Unclassified
Component: ssh (show other bugs)
Version: 4.2p1
Hardware: Other All
: P2 normal
Assignee: Damien Miller
URL:
Keywords:
Depends on:
Blocks: 1047
  Show dependency treegraph
 
Reported: 2005-11-04 17:52 AEDT by Ted Kremenek
Modified: 2006-10-07 11:43 AEST (History)
0 users

See Also:


Attachments
fix (480 bytes, patch)
2005-11-05 15:51 AEDT, Damien Miller
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Ted Kremenek 2005-11-04 17:52:58 AEDT
In buffer_put_bignum_ret...

Memory allocated at:

        u_char *buf = xmalloc(bin_size);

is leaked on the following error path:

        if (oi != bin_size) {
              ... [ LEAK ]
Comment 1 Damien Miller 2005-11-05 15:51:45 AEDT
Created attachment 1024 [details]
fix

I'll commit this soon
Comment 2 Damien Miller 2005-11-05 16:01:14 AEDT
fix applied and will be in 4.3, thanks for the report.
Comment 3 Darren Tucker 2006-10-07 11:43:02 AEST
Change all RESOLVED bug to CLOSED with the exception of the ones fixed post-4.4.