https://bugzilla.mindrot.org/show_bug.cgi?id=3882
Bug ID: 3882
Summary: When sshpam_handle is set, sshpam_init() leaks memory
Product: Portable OpenSSH
Version: 10.1p1
Hardware: Other
OS: Solaris
Status: NEW
Severity: enhancement
Priority: P5
Component: PAM support
Assignee: [email protected]
Reporter: [email protected]
In OpenSSH 10.0 and earlier, when sshpam_handle is
set in shhpam_init(), we either return 0 (same user) or we call
pam_end() and we ca;; pam_start/
In OpenSSH 10.1 or later, when sshpam_handle is set,
we either call fatal (different user) or continue
to pam_start().
I believe we should be returning 0 instead; but we
certainly leak a pam handle.
--
You are receiving this mail because:
You are watching the assignee of the bug.
_______________________________________________
openssh-bugs mailing list
[email protected]
https://lists.mindrot.org/mailman/listinfo/openssh-bugs