[11907] in Kerberos-V5-bugs
[krbdev.mit.edu #6800] memory leak in kg_new_connection
daemon@ATHENA.MIT.EDU (Greg Hudson via RT)
Tue Feb 22 16:07:25 2011
Mail-followup-to: rt@krbdev.mit.edu
mail-copies-to: never
From: "Greg Hudson via RT" <rt-comment@krbdev.MIT.EDU>
In-Reply-To: <rt-6800@krbdev.mit.edu>
Message-ID: <rt-6800-33830.17.5477283533731@krbdev.mit.edu>
To: "'AdminCc of krbdev.mit.edu Ticket #6800'":;"'AdminCc of krbdev.mit.edu Ticket #6800'":;@MIT.EDU
Date: Tue, 22 Feb 2011 16:07:23 -0500 (EST)
Reply-To: rt-comment@krbdev.MIT.EDU
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu
If we decide to go with a more minimal change for 1.9, inserting a
duplicate "krb5_free_creds(context, k_cred);" just after "/* return
successfully */" should do it.
_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs