diff options
author | paul <paul> | 2003-06-03 03:03:34 +0000 |
---|---|---|
committer | paul <paul> | 2003-06-03 03:03:34 +0000 |
commit | 852ba0e2cf9a1c6bba0988e98512a303cc9739e8 (patch) | |
tree | 6ab53c00990f5208317752b2649e6f31582e3033 /bgpd/bgp_clist.h | |
parent | bb3a023ed853b2335dccf25dfd8ec237fd9d8458 (diff) |
From: kamatchi soundaram <kamatchi@tdd.sj.nec.com>
Subject: [zebra 19259] Memory leak in OSPF
The detail of the memory leak follows:
File name: ospf_interface.c
Function name: ospf_if_new_hook().
Type of leak: Overwriting the already allocated memory.
Problem found and description:
The ospf_new_if_params() fn allocates a memory for "auth_crypt" which
is overwritten, down in the fn (ospf_if_new_hook) by explicitely allocating
a memory for the same "auth_crypt".
Fix: remove allocation from ospf_new_if_params()
Diffstat (limited to 'bgpd/bgp_clist.h')
0 files changed, 0 insertions, 0 deletions