To: | krb5-bugs@MIT.EDU |
Subject: | krb5_walk_realm_tree leaks in capaths case |
From: | Tom Yu <tlyu@MIT.EDU> |
Date: | Mon, 18 Jun 2007 17:40:54 -0400 |
r19582 | tlyu | 2007-06-18 17:07:37 -0400 (Mon, 18 Jun 2007) | 13 lines
Changed paths:
M /trunk
M /trunk/src/lib/krb5/krb/walk_rtree.c
ticket: new
subject: krb5_walk_realm_tree leaks in capaths case
target_version: 1.6.2
tags: pullup
Markus Moeller reports a leak in krb5_get_credentials() which was then
traced down to profile strings leaking from within
krb5_walk_realm_tree(). A pointer to a profile string was getting
overwritten without the string being freed when *cap_nodes[0] == '.'.
Fix is to free the string prior to overwriting the pointer if the
pointer is non-null.
Changed paths:
M /trunk
M /trunk/src/lib/krb5/krb/walk_rtree.c
ticket: new
subject: krb5_walk_realm_tree leaks in capaths case
target_version: 1.6.2
tags: pullup
Markus Moeller reports a leak in krb5_get_credentials() which was then
traced down to profile strings leaking from within
krb5_walk_realm_tree(). A pointer to a profile string was getting
overwritten without the string being freed when *cap_nodes[0] == '.'.
Fix is to free the string prior to overwriting the pointer if the
pointer is non-null.