[11971] in Kerberos-V5-bugs
[krbdev.mit.edu #6903] Fix memory leak in kpasswd server UDP error
daemon@ATHENA.MIT.EDU (Greg Hudson via RT)
Tue Apr 19 13:19:46 2011
Mail-followup-to: rt@krbdev.mit.edu
mail-copies-to: never
From: "Greg Hudson via RT" <rt-comment@krbdev.MIT.EDU>
In-Reply-To: <rt-6903@krbdev.mit.edu>
Message-ID: <rt-6903-34002.17.9003739852323@krbdev.mit.edu>
To: "'AdminCc of krbdev.mit.edu Ticket #6903'":;"'AdminCc of krbdev.mit.edu Ticket #6903'":;@MIT.EDU
Date: Tue, 19 Apr 2011 13:19:40 -0400 (EDT)
Reply-To: rt-comment@krbdev.MIT.EDU
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu
Although it's totally non-obvious, there is no memory leak after #6899.
When rep->data is allocated in process_chpw_request(), ret should always
be 0 (this is the non-obvious part). So when a non-zero return happens,
ret->data will be NULL, and the new code in #6899 will free the container.
_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs