Description of problem: There is a memory leak in ls.c: if (!must_match_at_current_pos) { struct mystr scan_fwd = INIT_MYSTR; str_mid_to_end(&name_remain_str, &scan_fwd, indexx + str_getlen(&s_match_needed_str)); /* we're allowed to be greedy, test if it match further along * keep advancing indexx while we can still match */ while( (locate_result = str_locate_str(&scan_fwd, &s_match_needed_str)), locate_result.found ) { indexx += locate_result.index + str_getlen(&s_match_needed_str); str_mid_to_end(&scan_fwd, &temp_str, locate_result.index + str_getlen(&s_match_needed_str)); str_copy(&scan_fwd, &temp_str); } } scan_fwd is never freed and therefore forever lost. Version-Release number of selected component (if applicable): vsftpd-2.0.1-5.EL4.7 Additional info: The leak was introduced by patch in Bug #244864
This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux maintenance release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Update release for currently deployed products. This request is not yet committed for inclusion in an Update release.
This bugzilla has Keywords: Regression. Since no regressions are allowed between releases, it is also being proposed as a blocker for this release. Please resolve ASAP.
Fix checked in CVS and the new packages were built successfully. This issue should be resolved in vsftpd-2.0.1-6.el4
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2008-0680.html