NetBSD Problem Report #53204
From www@NetBSD.org Sun Apr 22 22:08:17 2018
Return-Path: <www@NetBSD.org>
Received: from mail.netbsd.org (mail.netbsd.org [199.233.217.200])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client CN "mail.NetBSD.org", Issuer "mail.NetBSD.org CA" (not verified))
by mollari.NetBSD.org (Postfix) with ESMTPS id 756927A185
for <gnats-bugs@gnats.NetBSD.org>; Sun, 22 Apr 2018 22:08:17 +0000 (UTC)
Message-Id: <20180422220816.73C977A218@mollari.NetBSD.org>
Date: Sun, 22 Apr 2018 22:08:16 +0000 (UTC)
From: fgsch@lodoss.net
Reply-To: fgsch@lodoss.net
To: gnats-bugs@NetBSD.org
Subject: Leak in rl_callback_read_char?
X-Send-Pr-Version: www-1.0
>Number: 53204
>Category: lib
>Synopsis: Leak in rl_callback_read_char?
>Confidential: no
>Severity: non-critical
>Priority: medium
>Responsible: lib-bug-people
>State: open
>Class: sw-bug
>Submitter-Id: net
>Arrival-Date: Sun Apr 22 22:10:00 +0000 2018
>Originator: Federico Schwindt
>Release: readline.c rev 1.146
>Organization:
>Environment:
N/A
>Description:
In libedit/readline.c rl_callback_read_char(), buf is strdup'd but not freed afterwards.
The readline documentation does not mention anything about freeing the input to the callback function. This seems to be a bug specific to the readline emulation when using the alternate interface.
>How-To-Repeat:
>Fix:
(Contact us)
$NetBSD: query-full-pr,v 1.43 2018/01/16 07:36:43 maya Exp $
$NetBSD: gnats_config.sh,v 1.9 2014/08/02 14:16:04 spz Exp $
Copyright © 1994-2017
The NetBSD Foundation, Inc. ALL RIGHTS RESERVED.