NetBSD Problem Report #53204

From www@NetBSD.org  Sun Apr 22 22:08:17 2018
Return-Path: <www@NetBSD.org>
Received: from mail.netbsd.org (mail.netbsd.org [199.233.217.200])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(Client CN "mail.NetBSD.org", Issuer "mail.NetBSD.org CA" (not verified))
	by mollari.NetBSD.org (Postfix) with ESMTPS id 756927A185
	for <gnats-bugs@gnats.NetBSD.org>; Sun, 22 Apr 2018 22:08:17 +0000 (UTC)
Message-Id: <20180422220816.73C977A218@mollari.NetBSD.org>
Date: Sun, 22 Apr 2018 22:08:16 +0000 (UTC)
From: fgsch@lodoss.net
Reply-To: fgsch@lodoss.net
To: gnats-bugs@NetBSD.org
Subject: Leak in rl_callback_read_char?
X-Send-Pr-Version: www-1.0

>Number:         53204
>Category:       lib
>Synopsis:       Leak in rl_callback_read_char?
>Confidential:   no
>Severity:       non-critical
>Priority:       medium
>Responsible:    lib-bug-people
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Sun Apr 22 22:10:00 +0000 2018
>Originator:     Federico Schwindt
>Release:        readline.c rev 1.146
>Organization:
>Environment:
N/A
>Description:
In libedit/readline.c rl_callback_read_char(), buf is strdup'd but not freed afterwards.

The readline documentation does not mention anything about freeing the input to the  callback function. This seems to be a bug specific to the readline emulation when using the alternate interface.
>How-To-Repeat:

>Fix:

NetBSD Home
NetBSD PR Database Search

(Contact us) $NetBSD: query-full-pr,v 1.43 2018/01/16 07:36:43 maya Exp $
$NetBSD: gnats_config.sh,v 1.9 2014/08/02 14:16:04 spz Exp $
Copyright © 1994-2017 The NetBSD Foundation, Inc. ALL RIGHTS RESERVED.