[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH] In handle_channel_request_open(), variable type is freed too early and cause memory corruptions.
[Thread Prev] | [Thread Next]
- Subject: Re: [PATCH] In handle_channel_request_open(), variable type is freed too early and cause memory corruptions.
- From: Vic Lee <llyzs@xxxxxxx>
- Reply-to: libssh@xxxxxxxxxx
- Date: Wed, 20 Jan 2010 13:16:40 +0800
- To: libssh@xxxxxxxxxx
Hi Aris, It's hard to describe exactly how to reproduce the double-free but it did happen to me from time to time. From the source code before the patch, any "goto error" after "string_free(type);" will always double-free, because there's another string_free(type) in the error handler. But it's hard to say when "goto error" will happen. My suspect is this: msg->channel_request_open.originator = string_to_char(type); If type is freed, it could point to arbitrary data. The string_to_char function could try to allocate an unexpected large amount of memory, fail, then return NULL, and finally lead to double-free in the error handler. Vic On Tue, 2010-01-19 at 18:12 +0100, Aris Adamantiadis wrote: > Vic Lee a écrit : > > Hi, > > > > I recently encounter some occasional crashes when trying to use channel > > request stuff. It turned out that in function > > handle_channel_request_open(), a variable 'type' is freed but then used > > in later codes, which causes unexpected result, sometimes double-freed > > and crash, but if you are lucky sometimes things won't happen. > > > > I will consider this bug a very critical one because this will make the > > function handle_channel_request_open() very unstable, affecting both > > server side (all channel requests) and client side (x11 and > > forward-listen requests) > > > > I found this in v0-4 branch, please help me to check master as well... > > > > Thanks, > > > > Vic > > > Thanks for your patch. > > I will check on the master branch. I remember having reworked that code > (it's funny I did not see the problem), maybe I have corrected it. > Moreover, a double free is a security problem. If it is easy to > reproduce, we may have to do a security release. > > Aris >
Re: [PATCH] In handle_channel_request_open(), variable type is freed too early and cause memory corruptions. | Vic Lee <llyzs@xxxxxxx> |
[PATCH] In handle_channel_request_open(), variable type is freed too early and cause memory corruptions. | Vic Lee <llyzs@xxxxxxx> |
Re: [PATCH] In handle_channel_request_open(), variable type is freed too early and cause memory corruptions. | Aris Adamantiadis <aris@xxxxxxxxxxxx> |