Memory leak in krb5 version 1.17
Bug #2060666 reported by
Ponnuvel Palaniyappan
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
krb5 (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Focal |
In Progress
|
Undecided
|
Ponnuvel Palaniyappan |
Bug Description
Commit 1cd2821 altered the memory
management of krb5_gss_
an owner pointer when the function must acquire a default credential.
The commit neglected to update the code to release the default cred
along the successful path. The old code does not trigger because
cred_handle is now reassigned, so the default credential is leaked.
The commit https:/
It's been part of newer krb5 releases (Jammy, and Noble have the releases with the fix). Bionic doesn't have the commit the introduced the memory leak.
So this fix needs to be backported to Focal (only).
tags: | added: sts |
Changed in krb5 (Ubuntu Focal): | |
assignee: | nobody → Ponnuvel Palaniyappan (pponnuvel) |
Changed in krb5 (Ubuntu): | |
status: | New → Fix Released |
Changed in krb5 (Ubuntu Focal): | |
status: | New → In Progress |
To post a comment you must log in.