[Bug 1110] memory leak in bufaux.c, function: buffer_put_bignum_ret
bugzilla-daemon at mindrot.org
bugzilla-daemon at mindrot.org
Fri Nov 4 17:53:00 EST 2005
http://bugzilla.mindrot.org/show_bug.cgi?id=1110
Summary: memory leak in bufaux.c, function: buffer_put_bignum_ret
Product: Portable OpenSSH
Version: 4.2p1
Platform: Other
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: bitbucket at mindrot.org
ReportedBy: kremenek at cs.stanford.edu
In buffer_put_bignum_ret...
Memory allocated at:
u_char *buf = xmalloc(bin_size);
is leaked on the following error path:
if (oi != bin_size) {
... [ LEAK ]
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
More information about the openssh-bugs
mailing list