Red Hat Bugzilla – Bug 408431
Memory leak in pattern matching function
Last modified: 2016-07-26 19:46:39 EDT
Description of problem:
There is a memory leak in ls.c:
struct mystr scan_fwd = INIT_MYSTR;
indexx + str_getlen(&s_match_needed_str));
/* we're allowed to be greedy, test if it match further along
* keep advancing indexx while we can still match
while( (locate_result = str_locate_str(&scan_fwd, &s_match_needed_str)),
indexx += locate_result.index + str_getlen(&s_match_needed_str);
locate_result.index + str_getlen(&s_match_needed_str));
scan_fwd is never freed and therefore forever lost.
Version-Release number of selected component (if applicable):
The leak was introduced by patch in Bug #244864
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release. Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products. This request is not yet committed for inclusion in an Update
This bugzilla has Keywords: Regression.
Since no regressions are allowed between releases,
it is also being proposed as a blocker for this release.
Please resolve ASAP.
Fix checked in CVS and the new packages were built successfully. This issue
should be resolved in vsftpd-2.0.1-6.el4
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.