Fix for memory leak in krb5 1.3.5
Derrick Schommer
schommer at gmail.com
Sun Nov 7 22:05:10 EST 2004
Sorry, I reported that bug a few months ago and requested it be put in
the next public release. The bug is closed, and should show up soon as
the team has complied with my request.
I also found this with valgrind, but using my own client. There were
three others you might find as well, that have all been fixed.
Thanks,
Derrick
Jeffrey Altman wrote:
> I'm not sure why it was not pulled into the 1.3 tree but this
> problem does not exist in the cvs-head.
>
> Jeffrey Altman
>
>
> Jeremy Allison wrote:
>
>> Found using valgrind on Samba (fixing the latest salted key patch).
>> I couldn't find a kerberos bugzilla to send this fix to - how do
>> you report bugs/fixes to MIT ?
>>
>> Do MIT use valgrind on Linux when developing kerberos ? It's very
>> good !
>>
>> Jeremy Allison,
>> Samba Team.
>>
>> --- lib/krb5/ccache/ccbase.c.orig 2004-11-04 13:18:01.000000000
>> -0800
>> +++ lib/krb5/ccache/ccbase.c 2004-11-04 13:18:08.000000000 -0800
>> @@ -113,6 +113,7 @@
>>
>> if ( pfxlen == 1 && isalpha(name[0]) ) {
>> /* We found a drive letter not a prefix - use FILE: */
>> + free(pfx);
>> pfx = strdup("FILE:");
>> if (!pfx)
>> return ENOMEM;
>> @@ -121,6 +122,7 @@
>> } else {
>> resid = name + pfxlen + 1;
>>
>> + free(pfx);
>> pfx = malloc (pfxlen+1);
>> if (!pfx)
>> return ENOMEM;
>
>
More information about the Kerberos
mailing list