[krbdev.mit.edu #1665] memory leak in krb5_{init,free}_context

The RT System itself via RT rt-comment at krbdev.mit.edu
Tue Jul 15 14:43:36 EDT 2003


>From schemers at slapshot.stanford.edu  Tue Jul 15 14:43:32 2003
Received: from pacific-carrier-annex.mit.edu (PACIFIC-CARRIER-ANNEX.MIT.EDU [18.7.21.83]) by krbdev.mit.edu (8.9.3) with ESMTP
	id OAA24772; Tue, 15 Jul 2003 14:43:32 -0400 (EDT)
Received: from smtp2.Stanford.EDU (smtp2.Stanford.EDU [171.64.14.116])
	by pacific-carrier-annex.mit.edu (8.12.4/8.9.2) with ESMTP id h6FIhV6G011160
	for <krb5-bugs at mit.edu>; Tue, 15 Jul 2003 14:43:31 -0400 (EDT)
Received: (from root at localhost)
	by smtp2.Stanford.EDU (8.12.9/8.12.9) id h6FIhUxb008559
	for krb5-bugs at mit.edu; Tue, 15 Jul 2003 11:43:30 -0700 (PDT)
Received: from slapshot.stanford.edu (slapshot.Stanford.EDU [171.64.26.45])
	by smtp2.Stanford.EDU (8.12.9/8.12.9) with ESMTP id h6FIhSrH008530
	for <krb5-bugs at mit.edu>; Tue, 15 Jul 2003 11:43:28 -0700 (PDT)
Received: from slapshot.stanford.edu (localhost.localdomain [127.0.0.1])
	by slapshot.stanford.edu (8.12.8/8.12.8) with ESMTP id h6FIhTj6018437
	for <krb5-bugs at mit.edu>; Tue, 15 Jul 2003 11:43:29 -0700
Received: (from schemers at localhost)
	by slapshot.stanford.edu (8.12.8/8.12.8/Submit) id h6FIhS7U018435;
	Tue, 15 Jul 2003 11:43:28 -0700
Date: Tue, 15 Jul 2003 11:43:28 -0700
Message-Id: <200307151843.h6FIhS7U018435 at slapshot.stanford.edu>
To: krb5-bugs at mit.edu
Subject: memory leak  in krb5_{init,free}_context?
From: schemers at stanford.edu
Reply-To: schemers at stanford.edu
Cc: 
X-send-pr-version: 3.99


>Submitter-Id:	net
>Originator:	
>Organization:
	Stanford University
>Confidential:	no
>Synopsis:	memory leak in krb5_{init,free}_context
>Severity:	serious
>Priority:	medium
>Category:	krb5-libs
>Class:		sw-bug
>Release:	krb5-1.3
>Environment:
	
System: Linux slapshot.stanford.edu 2.4.20-18.9smp #1 SMP Thu May 29 06:55:05 EDT 2003 i686 i686 i386 GNU/Linux
Architecture: i686

>Description:
	There seems to be a memory leak when calling krb5_init_context
        followed by a krb5_free_context.
>How-To-Repeat:

Run this program and top at the same time. The memory for the process keeps
growing and growing. Using /usr/kerberos from Red Hat 9 there is no leak,
while when using Kerberos 1.3 from MIT there is a leak.

#include <krb5.h>

int 
main(int argc, char *argv[])
{
    krb5_context ctx;
    while (1) {
        krb5_init_context(&ctx);
        krb5_free_context(ctx);
    }
}

>Fix:
	haven't investigated that far yet...



More information about the krb5-bugs mailing list