From: Gonglei <arei.gong...@huawei.com> If vnc's password is configured, it will leak memory which cipher variable pointed on every vnc connection.
Cc: Daniel P. Berrange <berra...@redhat.com> Reviewed-by: Daniel P. Berrange <berra...@redhat.com> Signed-off-by: Gonglei <arei.gong...@huawei.com> Message-Id: <1437556133-11268-1-git-send-email-arei.gong...@huawei.com> Signed-off-by: Paolo Bonzini <pbonz...@redhat.com> --- ui/vnc.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/ui/vnc.c b/ui/vnc.c index 1483958..e26973a 100644 --- a/ui/vnc.c +++ b/ui/vnc.c @@ -2520,7 +2520,7 @@ static int protocol_client_auth_vnc(VncState *vs, uint8_t *data, size_t len) size_t i, pwlen; unsigned char key[8]; time_t now = time(NULL); - QCryptoCipher *cipher; + QCryptoCipher *cipher = NULL; Error *err = NULL; if (!vs->vd->password) { @@ -2573,6 +2573,8 @@ static int protocol_client_auth_vnc(VncState *vs, uint8_t *data, size_t len) start_client_init(vs); } + + qcrypto_cipher_free(cipher); return 0; reject: @@ -2584,6 +2586,7 @@ reject: } vnc_flush(vs); vnc_client_error(vs); + qcrypto_cipher_free(cipher); return 0; } -- 2.4.3