[Bug 2647] Tracking bug for OpenSSH 7.5 release

2017-02-27 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2647
Bug 2647 depends on bug 2683, which changed state.

Bug 2683 Summary: memory leak in ssh_packet_read_seqnr
https://bugzilla.mindrot.org/show_bug.cgi?id=2683

   What|Removed |Added

 Status|NEW |RESOLVED
 Resolution|--- |FIXED

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching the reporter of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 2683] memory leak in ssh_packet_read_seqnr

2017-02-27 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2683

Damien Miller  changed:

   What|Removed |Added

 CC||d...@mindrot.org
 Status|NEW |RESOLVED
 Resolution|--- |FIXED
 Blocks||2647

--- Comment #1 from Damien Miller  ---
Applied. This will be in OpenSSH 7.5.

commit d7abb771bd5a941b26144ba400a34563a1afa589
Author: d...@openbsd.org 
Date:   Tue Feb 28 06:10:08 2017 +

upstream commit

small memleak: free fd_set on connection timeout (though
we are heading to exit anyway). From Tom Rix in bz#2683

Upstream-ID: 10e3dadbb8199845b66581473711642d9e6741c4


Referenced Bugs:

https://bugzilla.mindrot.org/show_bug.cgi?id=2647
[Bug 2647] Tracking bug for OpenSSH 7.5 release
-- 
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 2647] Tracking bug for OpenSSH 7.5 release

2017-02-27 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2647

Damien Miller  changed:

   What|Removed |Added

 Depends on||2683


Referenced Bugs:

https://bugzilla.mindrot.org/show_bug.cgi?id=2683
[Bug 2683] memory leak in ssh_packet_read_seqnr
-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching the reporter of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 2684] calling realloc with a size <= 0

2017-02-27 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2684

Damien Miller  changed:

   What|Removed |Added

 CC||d...@mindrot.org

--- Comment #1 from Damien Miller  ---
realloc with 0 size is defined as per
http://pubs.opengroup.org/onlinepubs/009695399/functions/realloc.html

> If size is 0, either a null pointer or a unique pointer that can be 
> successfully passed to free() shall be returned

-- 
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs