diff options
author | paul <paul> | 2003-06-03 03:03:34 +0000 |
---|---|---|
committer | paul <paul> | 2003-06-03 03:03:34 +0000 |
commit | 852ba0e2cf9a1c6bba0988e98512a303cc9739e8 (patch) | |
tree | 6ab53c00990f5208317752b2649e6f31582e3033 | |
parent | bb3a023ed853b2335dccf25dfd8ec237fd9d8458 (diff) |
From: kamatchi soundaram <kamatchi@tdd.sj.nec.com>
Subject: [zebra 19259] Memory leak in OSPF
The detail of the memory leak follows:
File name: ospf_interface.c
Function name: ospf_if_new_hook().
Type of leak: Overwriting the already allocated memory.
Problem found and description:
The ospf_new_if_params() fn allocates a memory for "auth_crypt" which
is overwritten, down in the fn (ospf_if_new_hook) by explicitely allocating
a memory for the same "auth_crypt".
Fix: remove allocation from ospf_new_if_params()
-rw-r--r-- | ospfd/ospf_interface.c | 2 |
1 files changed, 0 insertions, 2 deletions
diff --git a/ospfd/ospf_interface.c b/ospfd/ospf_interface.c index a1b10c74..9f566a45 100644 --- a/ospfd/ospf_interface.c +++ b/ospfd/ospf_interface.c @@ -490,8 +490,6 @@ ospf_new_if_params () UNSET_IF_PARAM (oip, auth_crypt); UNSET_IF_PARAM (oip, auth_type); - oip->auth_crypt = list_new (); - return oip; } |