[krbdev.mit.edu #6787] S4U memory leak

Arlene Berry via RT rt-comment at krbdev.mit.edu
Tue Sep 28 08:42:34 EDT 2010


When using S4U, in src/lib/gssapi/krb5/s4u_gss_glue.c
kg_compose_deleg_cred, it creates a new unique memory credential cache
that is internal to the credential.  It needs to be destroyed when the
credential is released.  However, krb5_gss_release_cred only closes the
cache and it's being leaked.  Under other circumstances the cache field
points to a pre-existing credential cache that should not be destroyed.
There is nothing that indicates whether the cache should be destroyed,
so to solve this we'll add a flag to the credential structure unless you
have a better solution.





More information about the krb5-bugs mailing list