[11190] in Kerberos-V5-bugs
[krbdev.mit.edu #6551] SVN Commit
daemon@ATHENA.MIT.EDU (Tom Yu via RT)
Mon Sep 28 21:39:39 2009
Mail-Followup-To: rt@krbdev.mit.edu
mail-copies-to: never
From: "Tom Yu via RT" <rt-comment@krbdev.MIT.EDU>
In-Reply-To: <rt-6551@krbdev.mit.edu>
Message-ID: <rt-6551-31797.0.362799485049194@krbdev.mit.edu>
To: "'AdminCc of krbdev.mit.edu Ticket #6551'":;"'AdminCc of krbdev.mit.edu Ticket #6551'":;@MIT.EDU
Date: Tue, 29 Sep 2009 01:39:09 +0000 (UTC)
Reply-To: rt-comment@krbdev.MIT.EDU
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu
pull up r22636 from trunk
------------------------------------------------------------------------
r22636 | ghudson | 2009-08-27 09:40:50 -0400 (Thu, 27 Aug 2009) | 17 lines
ticket: 6551
subject: Memory leak in spnego accept_sec_context error path
tags: pullup
target_version: 1.7
If the underlying mechanism's accept_sec_context returns an error, the
spnego accept_sec_context was leaving allocated data in
*context_handle, which is incorrect for the first call according to
RFC 2744.
Fix this by mirroring some code from the spnego init_sec_context,
which always cleans up the half-constructed context in case of error.
This is allowed (though not encouraged) by RFC 2744 for second and
subsequent calls; since we were already doing it in init_sec_context,
it seems simpler to do that than keep track of whether this is a first
call or not.
http://src.mit.edu/fisheye/changelog/krb5/?cs=22813
Commit By: tlyu
Revision: 22813
Changed Files:
U branches/krb5-1-7/src/lib/gssapi/spnego/spnego_mech.c
_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs