Memory leak in krb5 version 1.17

Bug #2060666 reported by Ponnuvel Palaniyappan
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
krb5 (Ubuntu)
Fix Released
Undecided
Unassigned
Focal
In Progress
Undecided
Ponnuvel Palaniyappan

Bug Description

Commit 1cd2821 altered the memory
management of krb5_gss_inquire_cred(), introducing defcred to act as
an owner pointer when the function must acquire a default credential.
The commit neglected to update the code to release the default cred
along the successful path. The old code does not trigger because
cred_handle is now reassigned, so the default credential is leaked.

The commit https://github.com/krb5/krb5/commit/098f874f3b50dd2c46c0a574677324b5f6f3a1a8 fixes the leak.
It's been part of newer krb5 releases (Jammy, and Noble have the releases with the fix). Bionic doesn't have the commit the introduced the memory leak.

So this fix needs to be backported to Focal (only).

Tags: sts
tags: added: sts
Changed in krb5 (Ubuntu Focal):
assignee: nobody → Ponnuvel Palaniyappan (pponnuvel)
Changed in krb5 (Ubuntu):
status: New → Fix Released
Changed in krb5 (Ubuntu Focal):
status: New → In Progress
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.