From 4745d652b5e71c27fd891edfe690162c0b8d3005 Mon Sep 17 00:00:00 2001 From: Jon Simons Date: Sun, 5 Oct 2014 05:59:54 -0700 Subject: pki_crypto.c: plug ecdsa_sig->[r,s] bignum leaks Per ecdsa(3ssl), ECDSA_SIG_new does allocate its 'r' and 's' bignum fields. Fix a bug where the initial 'r' and 's' bignums were being overwritten with newly-allocated bignums, resulting in a memory leak. BUG: https://red.libssh.org/issues/175 Signed-off-by: Jon Simons Reviewed-by: Andreas Schneider --- include/libssh/bignum.h | 1 + 1 file changed, 1 insertion(+) (limited to 'include/libssh') diff --git a/include/libssh/bignum.h b/include/libssh/bignum.h index e5f2a472..61786c84 100644 --- a/include/libssh/bignum.h +++ b/include/libssh/bignum.h @@ -25,6 +25,7 @@ #include "libssh/libgcrypt.h" bignum make_string_bn(ssh_string string); +void make_string_bn_inplace(ssh_string string, bignum bnout); ssh_string make_bignum_string(bignum num); void ssh_print_bignum(const char *which,bignum num); -- cgit