diff options
author | paul <paul> | 2003-06-03 03:03:34 +0000 |
---|---|---|
committer | paul <paul> | 2003-06-03 03:03:34 +0000 |
commit | 32323dfbd057a42cab9322cac1f7a23d16f25faf (patch) | |
tree | 6de13fa582d1697d5e65f8c30fbbb590f6192e57 /ospfclient/ospfclient.c | |
parent | 419ae1eabf7907e6753c9daefabffe18526f1ef5 (diff) | |
download | quagga-32323dfbd057a42cab9322cac1f7a23d16f25faf.tar.bz2 quagga-32323dfbd057a42cab9322cac1f7a23d16f25faf.tar.xz |
From: kamatchi soundaram <kamatchi@tdd.sj.nec.com>
Subject: [zebra 19259] Memory leak in OSPF
The detail of the memory leak follows:
File name: ospf_interface.c
Function name: ospf_if_new_hook().
Type of leak: Overwriting the already allocated memory.
Problem found and description:
The ospf_new_if_params() fn allocates a memory for "auth_crypt" which
is overwritten, down in the fn (ospf_if_new_hook) by explicitely allocating
a memory for the same "auth_crypt".
Fix: remove allocation from ospf_new_if_params()
Diffstat (limited to 'ospfclient/ospfclient.c')
0 files changed, 0 insertions, 0 deletions