In buffer_put_bignum_ret... Memory allocated at: u_char *buf = xmalloc(bin_size); is leaked on the following error path: if (oi != bin_size) { ... [ LEAK ]
Created attachment 1024 [details] fix I'll commit this soon
fix applied and will be in 4.3, thanks for the report.
Change all RESOLVED bug to CLOSED with the exception of the ones fixed post-4.4.