Bug in krb5_keyblock_data function on Solaris 10/Opensolaris

Ken Raeburn raeburn at MIT.EDU
Mon Oct 15 18:23:19 EDT 2007

On Oct 15, 2007, at 17:44, Markus Moeller wrote:
> If other people come across this issue(noticable when  
> krb5_get_credentials
> is used in cross-realm situations) it had been identified in  
> Opensolaris
> snv_57 (http://bugs.opensolaris.org/view_bug.do?bug_id=6565115) but  
> still
> hasn't been fixed in source
> http://cvs.opensolaris.org/source/xref/onnv/onnv-gate/usr/src/uts/ 
> common/gssapi/mechs/krb5/krb5/krb/copy_key.c

Your suggested fix is to have krb5_copy_keyblock_data allocate the  
new storage, but the comment documenting the function says it assumes  
it's already been allocated, and the body of krb5_copy_keyblock  
further down does allocate the new storage before calling  
krb5_copy_keyblock.  So if I'm following this right, you'd be adding  
a memory leak to krb5_copy_keyblock, wouldn't you?

More information about the Kerberos mailing list