[krbdev.mit.edu #3610] memory leak of req_enctypes when using gss_set_allowable_enctypes

The RT System itself via RT rt-comment at krbdev.mit.edu
Wed Apr 5 15:10:08 EDT 2006


>From krb5-bugs-incoming-bounces at PCH.mit.edu  Wed Apr  5 15:10:04 2006
Received: from pch.mit.edu (PCH.MIT.EDU [18.7.21.90]) by krbdev.mit.edu (8.9.3p2) with ESMTP
	id PAA06626; Wed, 5 Apr 2006 15:10:04 -0400 (EDT)
Received: from pch.mit.edu (pch.mit.edu [127.0.0.1])
	by pch.mit.edu (8.13.6/8.12.8) with ESMTP id k35J9VcL019236
	for <krb5-send-pr at krbdev.mit.edu>; Wed, 5 Apr 2006 15:09:31 -0400
Received: from fort-point-station.mit.edu (FORT-POINT-STATION.MIT.EDU
	[18.7.7.76])
	by pch.mit.edu (8.13.6/8.12.8) with ESMTP id k35J9UYK019213
	for <krb5-bugs-incoming at PCH.mit.edu>; Wed, 5 Apr 2006 15:09:30 -0400
Received: from citi.umich.edu (citi.umich.edu [141.211.133.111])
	by fort-point-station.mit.edu (8.13.6/8.9.2) with ESMTP id
	k35J9QEb009685
	for <krb5-bugs at mit.edu>; Wed, 5 Apr 2006 15:09:26 -0400 (EDT)
Received: from rock.citi.umich.edu (rock.citi.umich.edu [141.211.133.90])
	(using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
	(No client certificate requested)
	by citi.umich.edu (Postfix) with ESMTP id 09E4E1BAF1
	for <krb5-bugs at mit.edu>; Wed,  5 Apr 2006 15:09:26 -0400 (EDT)
Received: (from kwc at localhost)
	by rock.citi.umich.edu (8.13.1/8.13.1/Submit) id k35J9PbJ030981;
	Wed, 5 Apr 2006 15:09:25 -0400
Date: Wed, 5 Apr 2006 15:09:25 -0400
Message-Id: <200604051909.k35J9PbJ030981 at rock.citi.umich.edu>
To: krb5-bugs at mit.edu
Subject: memory leak with gss_set_allowable_enctypes
From: kwc at citi.umich.edu
X-send-pr-version: 3.99
X-Spam-Score: -1.638
X-Spam-Flag: NO
X-Scanned-By: MIMEDefang 2.42
X-BeenThere: krb5-bugs-incoming at mailman.mit.edu
X-Mailman-Version: 2.1.6
Precedence: list
Reply-To: kwc at citi.umich.edu
Sender: krb5-bugs-incoming-bounces at PCH.mit.edu
Errors-To: krb5-bugs-incoming-bounces at PCH.mit.edu


>Submitter-Id:	net
>Originator:	Kevin Coffman (krb5)
>Organization:
	University of Michigan -- CITI
>Confidential:	no
>Synopsis:	memory leak of req_enctypes when using gss_set_allowable_enctypes
>Severity:	non-critical
>Priority:	medium
>Category:	krb5-libs
>Class:		sw-bug
>Release:	1.4.3
>Environment:
System: Linux rock.citi.umich.edu 2.6.16 #2 Tue Apr 4 11:59:44 EDT 2006 i686 i686 i386 GNU/Linux
Architecture: i686

>Description:
	The code for gss_set_allowable_enctypes() copies the list
	of requested enctypes to cred->req_enctypes.
	The release_cred routine was not changed to free this
	information.  (My bad.)

	Patch below fixes this.

>How-To-Repeat:
	Use gss_set_allowable_enctypes() and gss_release_cred().
>Fix:

--- rel_cred.c  2006-04-05 14:33:53.000000000 -0400
+++ /usr/local/src/krb5/krb5-1.4.2-keyring/src/lib/gssapi/krb5/rel_cred.c      2006-03-30 10:51:38.000000000 -0500
@@ -70,6 +70,8 @@ krb5_gss_release_cred(minor_status, cred
       code3 = 0;
    if (cred->princ)
       krb5_free_principal(context, cred->princ);
+   if (cred->req_enctypes)
+      xfree(cred->req_enctypes);
    xfree(cred);
    krb5_free_context(context);
 





More information about the krb5-bugs mailing list