summaryrefslogtreecommitdiffstats
path: root/ospfd
diff options
context:
space:
mode:
authorpaul <paul>2003-06-03 03:03:34 +0000
committerpaul <paul>2003-06-03 03:03:34 +0000
commit32323dfbd057a42cab9322cac1f7a23d16f25faf (patch)
tree6de13fa582d1697d5e65f8c30fbbb590f6192e57 /ospfd
parent419ae1eabf7907e6753c9daefabffe18526f1ef5 (diff)
downloadquagga-32323dfbd057a42cab9322cac1f7a23d16f25faf.tar.bz2
quagga-32323dfbd057a42cab9322cac1f7a23d16f25faf.tar.xz
From: kamatchi soundaram <kamatchi@tdd.sj.nec.com>
Subject: [zebra 19259] Memory leak in OSPF The detail of the memory leak follows: File name: ospf_interface.c Function name: ospf_if_new_hook(). Type of leak: Overwriting the already allocated memory. Problem found and description: The ospf_new_if_params() fn allocates a memory for "auth_crypt" which is overwritten, down in the fn (ospf_if_new_hook) by explicitely allocating a memory for the same "auth_crypt". Fix: remove allocation from ospf_new_if_params()
Diffstat (limited to 'ospfd')
-rw-r--r--ospfd/ospf_interface.c2
1 files changed, 0 insertions, 2 deletions
diff --git a/ospfd/ospf_interface.c b/ospfd/ospf_interface.c
index a1b10c74..9f566a45 100644
--- a/ospfd/ospf_interface.c
+++ b/ospfd/ospf_interface.c
@@ -490,8 +490,6 @@ ospf_new_if_params ()
UNSET_IF_PARAM (oip, auth_crypt);
UNSET_IF_PARAM (oip, auth_type);
- oip->auth_crypt = list_new ();
-
return oip;
}