pgsql: Fix a theoretical memory leak in pg_password_sendauth().

From: neilc(at)svr1(dot)postgresql(dot)org (Neil Conway)
To: pgsql-committers(at)postgresql(dot)org
Subject: pgsql: Fix a theoretical memory leak in pg_password_sendauth().
Date: 2005-06-30 01:59:20
Message-ID: 20050630015920.ACFFE529B4@svr1.postgresql.org
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-committers

Log Message:
-----------
Fix a theoretical memory leak in pg_password_sendauth(). If the first
malloc() succeeded but the second failed, the buffer allocated by the
first malloc() would be leaked. Fix this by allocating both buffers
via a single malloc(), as suggested by Tom.

Per Coverity static analysis performed by EnterpriseDB.

Modified Files:
--------------
pgsql/src/interfaces/libpq:
fe-auth.c (r1.102 -> r1.103)
(http://developer.postgresql.org/cvsweb.cgi/pgsql/src/interfaces/libpq/fe-auth.c.diff?r1=1.102&r2=1.103)

Browse pgsql-committers by date

  From Date Subject
Next Message James William Pye 2005-06-30 02:47:21 python - be: add install_so to install's subcommand list.
Previous Message Stephen Frost 2005-06-30 01:40:05 Re: pgsql: More cleanup on roles patch.