[11306] in Kerberos-V5-bugs

home help back first fref pref prev next nref lref last post

[krbdev.mit.edu #6631] Memory leak when environment variable

daemon@ATHENA.MIT.EDU (Paul Turgyan via RT)
Mon Jan 11 15:08:32 2010

Mail-followup-to: rt@krbdev.mit.edu
mail-copies-to: never
From: "Paul Turgyan via RT" <rt-comment@krbdev.MIT.EDU>
In-Reply-To: <rt-6631@krbdev.mit.edu>
Message-ID: <rt-6631-32150.18.2816580688993@krbdev.mit.edu>
To: "'AdminCc of krbdev.mit.edu Ticket #6631'":;"'AdminCc of krbdev.mit.edu Ticket #6631'":;@MIT.EDU
Date: Mon, 11 Jan 2010 15:08:29 -0500 (EST)
Reply-To: rt-comment@krbdev.MIT.EDU
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu


When the replay cache is set to "none"  using the environment variable  
KRB5RCACHETYPE=none
a memory leak occurs.  This was detected when using OpenLDAP, Cyrus- 
SASL, and GSSAPI authentication.


The following patch fixes the problem


diff -ur krb5-1.6.3/src/lib/krb5/krb/srv_rcache.c krb5-1.6.3um1/src/ 
lib/krb5/krb
/srv_rcache.c
*** krb5-1.6.3/src/lib/krb5/krb/srv_rcache.c    Fri Jun 30 01:59:46 2006
--- krb5-1.6.3um1/src/lib/krb5/krb/srv_rcache.c Mon Dec  7 16:19:02 2009
***************
*** 54,59 ****
--- 54,64 ----

       cachetype = krb5_rc_default_type(context);

+     if (strncmp (cachetype, "none", 4) == 0) {
+       *rcptr = 0;
+       return 0;
+     }
+
       len = piece->length + 3 + 1;
       for (i = 0; i < piece->length; i++) {
         if (piece->data[i] == '-')


_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs

home help back first fref pref prev next nref lref last post