Subject: Re: [libssh2] #299: Second memory leak

Re: [libssh2] #299: Second memory leak

From: libssh2 Trac <>
Date: Thu, 02 Apr 2015 16:14:47 -0000

#299: Second memory leak
  Reporter: double | Owner:
      Type: defect | Status: new
  Priority: normal | Milestone: 1.4.3
 Component: crypto | Version: 1.4.2
Resolution: | Keywords:
Blocked By: | Blocks:

Comment (by alamaison):

 Like #298, these are probably not real leaks. OpenSSL caches various
 pieces of global data that it initialises on demand. Once loaded, it
 caches them for the lifetime of the program. Some even _have_ to be kept
 for security reasons.

 If they are causing a problem by creating false positives when you're
 checking for memory leaks, try calling some of the globally-destructive
 OpenSSL cleanup functions in your application, only when running your leak
 checker or test suite.

 The following works for me:


Ticket URL: <>
libssh2 <>
C library for writing portable SSH2 clients
Received on 2015-04-02