NetBSD Problem Report #53204

From  Sun Apr 22 22:08:17 2018
Return-Path: <>
Received: from ( [])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(Client CN "", Issuer " CA" (not verified))
	by (Postfix) with ESMTPS id 756927A185
	for <>; Sun, 22 Apr 2018 22:08:17 +0000 (UTC)
Message-Id: <>
Date: Sun, 22 Apr 2018 22:08:16 +0000 (UTC)
Subject: Leak in rl_callback_read_char?
X-Send-Pr-Version: www-1.0

>Number:         53204
>Category:       lib
>Synopsis:       Leak in rl_callback_read_char?
>Confidential:   no
>Severity:       non-critical
>Priority:       medium
>Responsible:    lib-bug-people
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Sun Apr 22 22:10:00 +0000 2018
>Originator:     Federico Schwindt
>Release:        readline.c rev 1.146
In libedit/readline.c rl_callback_read_char(), buf is strdup'd but not freed afterwards.

The readline documentation does not mention anything about freeing the input to the  callback function. This seems to be a bug specific to the readline emulation when using the alternate interface.


NetBSD Home
NetBSD PR Database Search

(Contact us) $NetBSD: query-full-pr,v 1.43 2018/01/16 07:36:43 maya Exp $
$NetBSD:,v 1.9 2014/08/02 14:16:04 spz Exp $
Copyright © 1994-2017 The NetBSD Foundation, Inc. ALL RIGHTS RESERVED.