[Bug 1110] memory leak in bufaux.c, function: buffer_put_bignum_ret

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Fri Nov 4 17:53:00 EST 2005


http://bugzilla.mindrot.org/show_bug.cgi?id=1110

           Summary: memory leak in bufaux.c, function: buffer_put_bignum_ret
           Product: Portable OpenSSH
           Version: 4.2p1
          Platform: Other
        OS/Version: All
            Status: NEW
          Severity: normal
          Priority: P2
         Component: ssh
        AssignedTo: bitbucket at mindrot.org
        ReportedBy: kremenek at cs.stanford.edu


In buffer_put_bignum_ret...

Memory allocated at:

        u_char *buf = xmalloc(bin_size);

is leaked on the following error path:

        if (oi != bin_size) {
              ... [ LEAK ]




------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.




More information about the openssh-bugs mailing list