Date: Fri, 14 Jun 2002 15:57:23 -0700 (PDT) From: Nathan Mower <nmower@verio.net> To: freebsd-gnats-submit@FreeBSD.org Subject: misc/39314: Memory leak in setenv Message-ID: <200206142257.g5EMvNLO093586@www.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 39314
>Category: misc
>Synopsis: Memory leak in setenv
>Confidential: no
>Severity: non-critical
>Priority: low
>Responsible: freebsd-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Fri Jun 14 16:00:12 PDT 2002
>Closed-Date:
>Last-Modified:
>Originator: Nathan Mower
>Release: 4.4, 4.5, 4.6-RC, 5
>Organization:
NTT/Verio
>Environment:
FreeBSD hostname 4.4-RELEASE FreeBSD 4.4-RELEASE #1: Wed Jan 23 11:05:43 MST 2002 root@hostname:/usr/src/sys/compile/WHATEVER i386
>Description:
There is a memory leak in setenv in the case where a name/value pair already exists and the new value is larger than the old one. Setenv does not free the old memory before it malloc's space for the new string.
>How-To-Repeat:
setenv("HOME", "/usr/home/abc", 1);
setenv("HOME", "/usr/home/abcdefghijklmnopqrstuvwxyz", 1);
>Fix:
free the old environ[offset] before malloc'ing the new one.
>Release-Note:
>Audit-Trail:
>Unformatted:
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-bugs" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200206142257.g5EMvNLO093586>
