[369] in Kerberos-V5-bugs
another trivial memory leak in sendauth
daemon@ATHENA.MIT.EDU (Jim Miller)
Thu Oct 14 18:57:50 1993
From: jim@bilbo.suite.com (Jim Miller)
Date: Thu, 14 Oct 93 17:43:37 -0500
To: krb5-bugs@MIT.EDU
Reply-To: Jim_Miller@suite.com
This bug report is for Kerberos 5, pre-beta 3...
in lib/krb/sendauth.c
/*
* First write the length of the AP_REQ message, then write
* the message itself.
*/
if (retval = krb5_write_message(fd, &outbuf)) {
krb5_free_cred_contents(&creds);
memset((char *)&authent, 0, sizeof(authent));
return(retval);
}
free(outbuf.data);
"outbuf.data" doesn't get freed if "krb5_write_message" returns a fail status.
Jim_Miller@suite.com