diff options
author | paul <paul> | 2003-06-03 03:03:34 +0000 |
---|---|---|
committer | paul <paul> | 2003-06-03 03:03:34 +0000 |
commit | 32323dfbd057a42cab9322cac1f7a23d16f25faf (patch) | |
tree | 6de13fa582d1697d5e65f8c30fbbb590f6192e57 /ospfd | |
parent | 419ae1eabf7907e6753c9daefabffe18526f1ef5 (diff) | |
download | quagga-32323dfbd057a42cab9322cac1f7a23d16f25faf.tar.bz2 quagga-32323dfbd057a42cab9322cac1f7a23d16f25faf.tar.xz |
From: kamatchi soundaram <kamatchi@tdd.sj.nec.com>
Subject: [zebra 19259] Memory leak in OSPF
The detail of the memory leak follows:
File name: ospf_interface.c
Function name: ospf_if_new_hook().
Type of leak: Overwriting the already allocated memory.
Problem found and description:
The ospf_new_if_params() fn allocates a memory for "auth_crypt" which
is overwritten, down in the fn (ospf_if_new_hook) by explicitely allocating
a memory for the same "auth_crypt".
Fix: remove allocation from ospf_new_if_params()
Diffstat (limited to 'ospfd')
-rw-r--r-- | ospfd/ospf_interface.c | 2 |
1 files changed, 0 insertions, 2 deletions
diff --git a/ospfd/ospf_interface.c b/ospfd/ospf_interface.c index a1b10c74..9f566a45 100644 --- a/ospfd/ospf_interface.c +++ b/ospfd/ospf_interface.c @@ -490,8 +490,6 @@ ospf_new_if_params () UNSET_IF_PARAM (oip, auth_crypt); UNSET_IF_PARAM (oip, auth_type); - oip->auth_crypt = list_new (); - return oip; } |