[3505] in Kerberos-V5-bugs

home help back first fref pref prev next nref lref last post

[krbdev.mit.edu #1206] padata not freed from reply structure

daemon@ATHENA.MIT.EDU (The RT System itself via RT)
Fri Oct 4 09:25:14 2002

Message-Id: <rt-1206-3108.10.3532335506219@krbdev.mit.edu>
In-Reply-To: <rt-1206@krbdev.mit.edu>
From: "The RT System itself via RT" <rt-comment@krbdev.mit.edu>
Reply-To: rt-comment@krbdev.mit.edu
To: krb5-prs@mit.edu
Errors-To: krb5-bugs-admin@mit.edu
Date: Fri, 4 Oct 2002 09:24:35 -0400 (EDT)


From kwc@dh171.citi.umich.edu  Fri Oct  4 09:24:32 2002
Received: from fort-point-station.mit.edu (FORT-POINT-STATION.MIT.EDU [18.7.7.76]) by krbdev.mit.edu (8.9.3) with ESMTP
	id JAA13557; Fri, 4 Oct 2002 09:24:32 -0400 (EDT)
Received: from dh171.citi.umich.edu (dh171.citi.umich.edu [141.211.133.171])
	by fort-point-station.mit.edu (8.9.2/8.9.2) with ESMTP id JAA14956
	for <krb5-bugs@mit.edu>; Fri, 4 Oct 2002 09:24:32 -0400 (EDT)
Received: (from kwc@localhost)
	by dh171.citi.umich.edu (8.11.6/8.11.6) id g94DRuN32591;
	Fri, 4 Oct 2002 09:27:56 -0400
Date: Fri, 4 Oct 2002 09:27:56 -0400
Message-Id: <200210041327.g94DRuN32591@dh171.citi.umich.edu>
To: krb5-bugs@mit.edu
Subject: padata memory leak in AS_REQ path
From: kwc@citi.umich.edu
Reply-To: kwc@citi.umich.edu
X-send-pr-version: 3.99


>Submitter-Id:	net
>Originator:	Kevin Coffman
>Organization:
Kevin Coffman           Center for Information Technology Integration
----------------------  University of Michigan
Phone: (734) 763-0592   3106 Argus
mailto:kwc@umich.edu    535 West William Street
----------------------  Ann Arbor, MI, 48103-4943
http://www.citi.umich.edu/u/kwc/
>Confidential:	no
>Synopsis:	padata not freed from reply structure
>Severity:	serious
>Priority:	medium
>Category:	krb5-kdc
>Class:		sw-bug
>Release:	krb5-1.2.5
>Environment:
	
	All systems and architectures are affected.

>Description:
	
	When preauthentication data is returned as part of the
	AS_REQ, the padata is never released from the reply
	structure after the return packet is constructed.

	Also, normal processing already frees the encrypting_key
	contents, so it should be free conditionally in the errout:
	section.
>How-To-Repeat:
	
	AS_REQs for users with only an AFS key in the database have
	the pw-salt padata returned in the response.  Also, we have
	code to use the SPECIAL salt type for users whose principal
	name (uniqname) has been changed.  This also results in
	padata being returned in the response.

>Fix:
	

	Apply the following patch (this patch is against the 1.2.6 release):

--- src/kdc/do_as_req.c.orig    Fri Oct  4 09:00:10 2002
+++ src/kdc/do_as_req.c Fri Oct  4 09:04:35 2002
@@ -448,8 +448,10 @@
        errcode = prepare_error_as(request, errcode, &e_data, response);
     }
 
-    krb5_free_keyblock_contents(kdc_context, &encrypting_key);
-
+    if (encrypting_key.contents)
+           krb5_free_keyblock_contents(kdc_context, &encrypting_key);
+    if (reply.padata)
+           krb5_free_pa_data(kdc_context, reply.padata);
     if (cname)
            free(cname);
     if (sname)

_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
http://mailman.mit.edu/mailman/listinfo/krb5-bugs

home help back first fref pref prev next nref lref last post