[krbdev.mit.edu #1601] [<Kent_Wu@trendmicro.com>] RE: memory leak in some Kerberos APIs?

Kent_Wu@trendmicro.com via RT rt-comment at krbdev.mit.edu
Tue Jun 17 14:56:19 EDT 2003


Thx for the update, Tom. I'll try the latest Beta later when I got time. One more question is when will you plan to release 1.3, I hope it can be in line with our release as well.

Kent

-----Original Message-----
From: Tom Yu via RT [mailto:rt-comment at krbdev.mit.edu]
Sent: Monday, June 16, 2003 11:56 PM
To: Kent Wu (RD-US)
Cc: krb5-prs at mit.edu
Subject: Re: [krbdev.mit.edu #1601] [<Kent_Wu at trendmicro.com>] RE:
memory leak in some Kerberos APIs?


Two of the three memory leaks noted in this ticket have their own
tickets -- [1602] and [1604].  [1602] is the checksum leak, and [1604]
is the ktypes leak.  The getaddrinfo() leak we have not been able to
reproduce, and I am inclined to believe that it is an OS bug.

The return addrinfo structure from getaddrinfo() is significantly
larger than 16 bytes, so we are not leaking that.  Note, however, that
a struct sockaddr is 16 bytes on sparc/solaris, and it's quite
plausible that what you're seeing is an artifact of an OS bug.

The latest beta release (krb5-1.3-beta4) should have fixes for [1602]
and [1604].  I'm closing this bug [1601] for now, since I'm fairly
convinced it's not a bug in our code.

---Tom



More information about the krb5-bugs mailing list