[Bug 3882] New: When sshpam_handle is set, sshpam_init() leaks memory
bugzilla-daemon at mindrot.org
bugzilla-daemon at mindrot.org
Mon Oct 13 21:10:29 AEDT 2025
https://bugzilla.mindrot.org/show_bug.cgi?id=3882
Bug ID: 3882
Summary: When sshpam_handle is set, sshpam_init() leaks memory
Product: Portable OpenSSH
Version: 10.1p1
Hardware: Other
OS: Solaris
Status: NEW
Severity: enhancement
Priority: P5
Component: PAM support
Assignee: unassigned-bugs at mindrot.org
Reporter: chsdik at gmail.com
In OpenSSH 10.0 and earlier, when sshpam_handle is
set in shhpam_init(), we either return 0 (same user) or we call
pam_end() and we ca;; pam_start/
In OpenSSH 10.1 or later, when sshpam_handle is set,
we either call fatal (different user) or continue
to pam_start().
I believe we should be returning 0 instead; but we
certainly leak a pam handle.
--
You are receiving this mail because:
You are watching the assignee of the bug.
More information about the openssh-bugs
mailing list