[16721] in Kerberos-V5-bugs
[krbdev.mit.edu #8991] git commit
daemon@ATHENA.MIT.EDU (Greg Hudson via RT)
Tue Mar 23 00:26:36 2021
From: "Greg Hudson via RT" <rt-comment@krbdev.mit.edu>
In-Reply-To:
Message-ID: <rt-4.4.4-23667-1616473588-942.8991-4-0@mit.edu>
To: "AdminCc of krbdev.mit.edu Ticket #8991":;
Date: Tue, 23 Mar 2021 00:26:28 -0400
MIME-Version: 1.0
Reply-To: rt-comment@krbdev.mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu
Tue Mar 23 00:26:28 2021: Request 8991 was acted upon.
Transaction: Ticket created by ghudson@mit.edu
Queue: krb5
Subject: git commit
Owner: ghudson@mit.edu
Requestors:
Status: new
Ticket <URL: https://krbdev.mit.edu/rt/Ticket/Display.html?id=8991 >
Fix PKINIT memory leaks
pkinit_client_process() calls pkinit_client_profile() a second time,
leaking the values obtained the first time. Remove the call.
Commit 13ae08e70a05768d4f65978ce1a8d4e16fec0d35 introduced more
possibilities for process_option_identity() to return failure after it
filled in some fields. PKCS11 option parsing already prevents leaks
by freeing old values before setting new ones; do so in the other
option-parsing functions as well.
https://github.com/krb5/krb5/commit/aee8a823db095eda5842420e917fe7a664a0e7af
Author: Greg Hudson <ghudson@mit.edu>
Commit: aee8a823db095eda5842420e917fe7a664a0e7af
Branch: master
src/plugins/preauth/pkinit/pkinit_clnt.c | 2 --
src/plugins/preauth/pkinit/pkinit_identity.c | 5 +++++
2 files changed, 5 insertions(+), 2 deletions(-)
_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs