Wireshark-bugs: [Wireshark-bugs] [Bug 7352] New: Airpcap memory leak?
Date: Sun, 10 Jun 2012 14:29:06 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7352

           Summary: Airpcap memory leak?
           Product: Wireshark
           Version: SVN
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: Major
          Priority: Low
         Component: Capture file support (libwiretap)
        AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
        ReportedBy: eapache@xxxxxxxxx


Build Information:
wireshark 1.9.0 (SVN Rev Unknown from unknown)

Copyright 1998-2012 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with GTK+ 2.24.10, with Cairo 1.12.2, with Pango 1.30.1, with
GLib 2.32.1, with libpcap, with libz 1.2.3.4, with POSIX capabilities (Linux),
with SMI 0.4.8, with c-ares 1.8.0, with Lua 5.1, without Python, with GnuTLS
2.12.14, with Gcrypt 1.5.0, with MIT Kerberos, with GeoIP, with PortAudio
V19-devel (built Dec 10 2011 11:43:10), with AirPcap.

Running on Linux 3.4.0-5-generic, with locale en_CA.UTF-8, with libpcap version
1.2.1, with libz 1.2.3.4, GnuTLS 2.12.14, Gcrypt 1.5.0, without AirPcap.

Built using gcc 4.6.3.
--
Cppcheck found memory that was being allocated but unused. Further
investigation leads me to believe that we're actually leaking memory in this
case - get_airpcap_if_from_name() doesn't do anything destructive with its
parameters, so there's no need to strdup them in the first place.

Also fix indentation.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.