https://bugzilla.mindrot.org/show_bug.cgi?id=1967
--- Comment #4 from Zhenbo Xu <[email protected]> 2011-12-31 01:44:17 EST --- http://lcs.ios.ac.cn/~xuzb/bugsfound/memleak/openssh-5.9p1/realbugs/report-u6oVoX.html#EndPath This report means that the heap object allocated to fwd.connect_host by function "parse_forward" is not freed at the end of the function since fwd is a local variable. http://lcs.ios.ac.cn/~xuzb/bugsfound/memleak/openssh-5.9p1/realbugs/report-Fs8fvc.html#EndPath In this report, the loop below iterates two times. At the first iteration, a heap object is allocated to options->user at "charptr = &options->user; ... *charptr = xstrdup(arg);", which is leaked at the second iteration if options->user is reassigned. while (fgets(line, sizeof(line), f)) { linenum++; if (process_config_line(options, host, line, filename, linenum, &active) != 0) bad_options++; } Here is a list of some bugs, most of which are confirmed as false alarms by myself. It may contain some potential bugs or be helpful with you, although most of these are useless or can be eliminated by improving our tool. http://lcs.ios.ac.cn/~xuzb/bugsfound/memleak/openssh-5.9p1/falsealarms/index.html -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug. You are watching someone on the CC list of the bug. _______________________________________________ openssh-bugs mailing list [email protected] https://lists.mindrot.org/mailman/listinfo/openssh-bugs
