Question about freeing memory when using krb5_get_credentials

Markus Moeller huaraz at moeller.plus.com
Fri Jun 15 14:13:05 EDT 2007


Tom,

yes your fix is solving  my issue.

Thank you
Markus

"Tom Yu" <tlyu at MIT.EDU> wrote in message 
news:ldv1wge2msr.fsf at cathode-dark-space.mit.edu...
>>>>>> "Markus" == Markus Moeller <huaraz at moeller.plus.com> writes:
>
> Markus> My capath looks like:
> Markus> [capaths]
> Markus>        SUSE.HOME = {
> Markus>           XEN.HOME = WINDOWS2003.HOME
> Markus>           WINDOWS2003.HOME = .
> Markus>        }
> Markus>        XEN.HOME = {
> Markus>           SUSE.HOME = WINDOWS2003.HOME
> Markus>        }
> Markus>        WINDOWS2003.HOME = {
> Markus>           SUSE.HOME = .
> Markus>        }
>
> I assume that you are attempting to authenticate between two realms
> which are listed in your capaths as directly connected.  Please try
> the following patch and let me know if it stops the leak.  Basically
> it looks like a pointer is getting overwritten and thereby leaking a
> string allocated by the profile library.
>
> === src/lib/krb5/krb/walk_rtree.c
> ==================================================================
> --- src/lib/krb5/krb/walk_rtree.c (revision 20062)
> +++ src/lib/krb5/krb/walk_rtree.c (local)
> @@ -167,6 +167,9 @@
>  links++;
>      }
>  }
> + if (cap_nodes[links] != NULL)
> +     krb5_xfree(cap_nodes[links]);
> +
>  cap_nodes[links] = cap_server; /* put server on end of list */
>  /* this simplifies the code later and make */
>  /* cleanup eaiser as well */
>
> ________________________________________________
> Kerberos mailing list           Kerberos at mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos
> 






More information about the Kerberos mailing list