Comment 12 for bug 1883614

Revision history for this message
Rafael David Tinoco (rafaeldtinoco) wrote :

For the record only.. in between 1.13.4 and 1.14.2 (next version after xenial) we have:

2dcf7b9 NSS: Fix NSS responder to cope with fully-qualified usernames
1510d12 test_ipa_subdom_server: Workaround for slow krb5 + SELinux
c19374b cache_req tests: use leak check in test fixtures
2dd75ea TOOLS: Fix memory leak after getline() failed
556801e SUDO: fix potential memory leak in sdap_sudo_init
343b053 NSS: fix a use-after-free issue
1584db9 intg: fix assert messages in test_memory_cache
8c9ecf0 PROXY: fix minor memory leak
3fa03d5 SDAP: fix minor memory leak
a2d6d4d IPA: fix minor memory leak
12440d2 AD: fix minor memory leak

and from 1.14.2 to 1.16_5 (latest release from 1.x series) we have:

acce032 lib/cifs_idmap_sss: fixed unaligned mem access
d1c9308 tests: fix mocking krb5_creds in test_copy_ccache
f62d2af CRYPTO: Save prefix in s3crypt_sha512
6191cf8 KCM: be aware that size_t might have different size than other integers
e354ec7 DP/LDAP: Only increase the initgrTimestamp when the full initgroups DP request finishes
fd17e09 mmap_cache: Remove unnecessary memchr in client code
2951a9a CRYPTO: Suppress warning Wstringop-truncation
613a832 KCM: Add some forgotten NULL checks
f772649 KRB5: Fix access_provider=krb5
327a166 PAM: fix memory leak in pam_sss
e6a5f8c WATCHDOG: Avoid non async-signal-safe from the signal_handler
f78b2dd krb5: fix two memory leaks

as commits that *could* be related.