svn rev #24456: branches/krb5-1-9/src/ config/ lib/krb5/krb/

tlyu@MIT.EDU tlyu at MIT.EDU
Fri Oct 15 16:42:24 EDT 2010


http://src.mit.edu/fisheye/changelog/krb5/?cs=24456
Commit By: tlyu
Log Message:
ticket: 6801
version_fixed: 1.9

pull up r24452, r24453, r24454 from trunk

 ------------------------------------------------------------------------
 r24454 | ghudson | 2010-10-13 13:20:36 -0400 (Wed, 13 Oct 2010) | 2 lines

 Whitespace.

 ------------------------------------------------------------------------
 r24453 | hartmans | 2010-10-12 21:19:20 -0400 (Tue, 12 Oct 2010) | 2 lines

 Adjust valgrind support to assume a modern valgrind that requires %p in log files.

 ------------------------------------------------------------------------
 r24452 | hartmans | 2010-10-12 21:19:14 -0400 (Tue, 12 Oct 2010) | 14 lines

 ticket: 6801
 target_version: 1.9
 Subject: Fix leaks in get_init_creds interface

 In Debian Bug 598032, Bastian Blank points out that there are two
 leaks in the get_init_creds interface:

 * Free ctx->request->padata after sending the KDC request so it is not
 overwritten the next time around the loop.

 * If options is NULL passed into krb5_get_init_creds_init, then set up
 a non-extended options structure so that krb5_get_init_creds_free will
 free the options.


Changed Files:
U   branches/krb5-1-9/src/config/pre.in
U   branches/krb5-1-9/src/lib/krb5/krb/get_in_tkt.c
Modified: branches/krb5-1-9/src/config/pre.in
===================================================================
--- branches/krb5-1-9/src/config/pre.in	2010-10-14 22:49:11 UTC (rev 24455)
+++ branches/krb5-1-9/src/config/pre.in	2010-10-15 20:42:23 UTC (rev 24456)
@@ -566,7 +566,7 @@
 # Need absolute paths here because under kshd or ftpd we may run programs
 # while in other directories.
 VALGRIND_LOGDIR = `cd $(BUILDTOP)&&pwd`
-VALGRIND1 = valgrind --tool=memcheck --log-file=$(VALGRIND_LOGDIR)/vg --trace-children=yes -v --leak-check=yes --suppressions=`cd $(top_srcdir)&&pwd`/util/valgrind-suppressions
+VALGRIND1 = valgrind --tool=memcheck --log-file=$(VALGRIND_LOGDIR)/vg.%p --trace-children=yes -v --leak-check=yes --suppressions=`cd $(top_srcdir)&&pwd`/util/valgrind-suppressions
 
 # Set OFFLINE=yes to disable tests that assume network connectivity.
 # (Specifically, this concerns the ability to fetch DNS data for

Modified: branches/krb5-1-9/src/lib/krb5/krb/get_in_tkt.c
===================================================================
--- branches/krb5-1-9/src/lib/krb5/krb/get_in_tkt.c	2010-10-14 22:49:11 UTC (rev 24455)
+++ branches/krb5-1-9/src/lib/krb5/krb/get_in_tkt.c	2010-10-15 20:42:23 UTC (rev 24456)
@@ -798,6 +798,7 @@
     int tmp;
     char *str = NULL;
     krb5_gic_opt_ext *opte;
+    krb5_get_init_creds_opt local_opts;
 
     TRACE_INIT_CREDS(context, client);
 
@@ -822,9 +823,14 @@
     ctx->start_time = start_time;
 
     if (options == NULL) {
-        code = krb5_get_init_creds_opt_alloc(context, &options);
-        if (code != 0)
-            goto cleanup;
+        /*
+         * We initialize a non-extended options because that way the shadowed
+         * flag will be sent and they will be freed when the init_creds context
+         * is freed. The options will be extended and copied off the stack into
+         * storage by opt_to_opte.
+         */
+        krb5_get_init_creds_opt_init(&local_opts);
+        options = &local_opts;
     }
 
     code = krb5int_gic_opt_to_opte(context, options,
@@ -1175,6 +1181,8 @@
         goto cleanup;
 
 cleanup:
+    krb5_free_pa_data(context, ctx->request->padata);
+    ctx->request->padata = NULL;
     return code;
 }
 




More information about the cvs-krb5 mailing list