[11251] in Kerberos-V5-bugs
[krbdev.mit.edu #6599] memory leak in krb5_rd_req_decrypt_tkt_part
daemon@ATHENA.MIT.EDU (Arlene Berry" via RT)
Tue Dec 22 18:05:22 2009
Mail-followup-to: rt@krbdev.mit.edu
mail-copies-to: never
From: ""Arlene Berry" via RT" <rt-comment@krbdev.MIT.EDU>
In-Reply-To: <rt-6599@krbdev.mit.edu>
Message-ID: <rt-6599-31928.17.7405297017138@krbdev.mit.edu>
To: "'AdminCc of krbdev.mit.edu Ticket #6599'":;"'AdminCc of krbdev.mit.edu Ticket #6599'":;@MIT.EDU
Date: Tue, 22 Dec 2009 23:05:01 +0000 (UTC)
Reply-To: rt-comment@krbdev.MIT.EDU
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu
I'm seeing a leak in krb5_rd_req_decrpt_tkt_part while iterating over
the keytab. This fixes it for us:
Index: rd_req_dec.c
===================================================================
--- rd_req_dec.c (revision 23482)
+++ rd_req_dec.c (working copy)
@@ -114,8 +114,10 @@
while ((code = krb5_kt_next_entry(context, keytab,
&ktent, &cursor)) == 0) {
- if (ktent.key.enctype != req->ticket->enc_part.enctype)
+ if (ktent.key.enctype != req->ticket->enc_part.enctype) {
+ (void) krb5_free_keytab_entry_contents(context,
&ktent);
continue;
+ }
retval = krb5_decrypt_tkt_part(context, &ktent.key,
req->ticket);
_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs