[11306] in Kerberos-V5-bugs
[krbdev.mit.edu #6631] Memory leak when environment variable
daemon@ATHENA.MIT.EDU (Paul Turgyan via RT)
Mon Jan 11 15:08:32 2010
Mail-followup-to: rt@krbdev.mit.edu
mail-copies-to: never
From: "Paul Turgyan via RT" <rt-comment@krbdev.MIT.EDU>
In-Reply-To: <rt-6631@krbdev.mit.edu>
Message-ID: <rt-6631-32150.18.2816580688993@krbdev.mit.edu>
To: "'AdminCc of krbdev.mit.edu Ticket #6631'":;"'AdminCc of krbdev.mit.edu Ticket #6631'":;@MIT.EDU
Date: Mon, 11 Jan 2010 15:08:29 -0500 (EST)
Reply-To: rt-comment@krbdev.MIT.EDU
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu
When the replay cache is set to "none" using the environment variable
KRB5RCACHETYPE=none
a memory leak occurs. This was detected when using OpenLDAP, Cyrus-
SASL, and GSSAPI authentication.
The following patch fixes the problem
diff -ur krb5-1.6.3/src/lib/krb5/krb/srv_rcache.c krb5-1.6.3um1/src/
lib/krb5/krb
/srv_rcache.c
*** krb5-1.6.3/src/lib/krb5/krb/srv_rcache.c Fri Jun 30 01:59:46 2006
--- krb5-1.6.3um1/src/lib/krb5/krb/srv_rcache.c Mon Dec 7 16:19:02 2009
***************
*** 54,59 ****
--- 54,64 ----
cachetype = krb5_rc_default_type(context);
+ if (strncmp (cachetype, "none", 4) == 0) {
+ *rcptr = 0;
+ return 0;
+ }
+
len = piece->length + 3 + 1;
for (i = 0; i < piece->length; i++) {
if (piece->data[i] == '-')
_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs