[Bug 3882] New: When sshpam_handle is set, sshpam_init() leaks memory

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Mon Oct 13 21:10:29 AEDT 2025


https://bugzilla.mindrot.org/show_bug.cgi?id=3882

            Bug ID: 3882
           Summary: When sshpam_handle is set, sshpam_init() leaks memory
           Product: Portable OpenSSH
           Version: 10.1p1
          Hardware: Other
                OS: Solaris
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: PAM support
          Assignee: unassigned-bugs at mindrot.org
          Reporter: chsdik at gmail.com

In OpenSSH 10.0 and earlier, when sshpam_handle is
set in shhpam_init(), we either return 0 (same user) or we call
pam_end() and we ca;; pam_start/

In OpenSSH 10.1 or later, when sshpam_handle is set,
we either call fatal (different user) or continue
to pam_start().

I believe we should be returning 0 instead; but we
certainly leak a pam handle.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.


More information about the openssh-bugs mailing list