[Bug 3882] New: When sshpam_handle is set, sshpam_init() leaks memory
    bugzilla-daemon at mindrot.org 
    bugzilla-daemon at mindrot.org
       
    Mon Oct 13 21:10:29 AEDT 2025
    
    
  
https://bugzilla.mindrot.org/show_bug.cgi?id=3882
            Bug ID: 3882
           Summary: When sshpam_handle is set, sshpam_init() leaks memory
           Product: Portable OpenSSH
           Version: 10.1p1
          Hardware: Other
                OS: Solaris
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: PAM support
          Assignee: unassigned-bugs at mindrot.org
          Reporter: chsdik at gmail.com
In OpenSSH 10.0 and earlier, when sshpam_handle is
set in shhpam_init(), we either return 0 (same user) or we call
pam_end() and we ca;; pam_start/
In OpenSSH 10.1 or later, when sshpam_handle is set,
we either call fatal (different user) or continue
to pam_start().
I believe we should be returning 0 instead; but we
certainly leak a pam handle.
-- 
You are receiving this mail because:
You are watching the assignee of the bug.
    
    
More information about the openssh-bugs
mailing list