Tom,

yes your fix is solving  my issue.

Thank you
Markus

"Tom Yu" <[EMAIL PROTECTED]> wrote in message 
news:[EMAIL PROTECTED]
>>>>>> "Markus" == Markus Moeller <[EMAIL PROTECTED]> writes:
>
> Markus> My capath looks like:
> Markus> [capaths]
> Markus>        SUSE.HOME = {
> Markus>           XEN.HOME = WINDOWS2003.HOME
> Markus>           WINDOWS2003.HOME = .
> Markus>        }
> Markus>        XEN.HOME = {
> Markus>           SUSE.HOME = WINDOWS2003.HOME
> Markus>        }
> Markus>        WINDOWS2003.HOME = {
> Markus>           SUSE.HOME = .
> Markus>        }
>
> I assume that you are attempting to authenticate between two realms
> which are listed in your capaths as directly connected.  Please try
> the following patch and let me know if it stops the leak.  Basically
> it looks like a pointer is getting overwritten and thereby leaking a
> string allocated by the profile library.
>
> === src/lib/krb5/krb/walk_rtree.c
> ==================================================================
> --- src/lib/krb5/krb/walk_rtree.c (revision 20062)
> +++ src/lib/krb5/krb/walk_rtree.c (local)
> @@ -167,6 +167,9 @@
>  links++;
>      }
>  }
> + if (cap_nodes[links] != NULL)
> +     krb5_xfree(cap_nodes[links]);
> +
>  cap_nodes[links] = cap_server; /* put server on end of list */
>  /* this simplifies the code later and make */
>  /* cleanup eaiser as well */
>
> ________________________________________________
> Kerberos mailing list           [email protected]
> https://mailman.mit.edu/mailman/listinfo/kerberos
> 



________________________________________________
Kerberos mailing list           [email protected]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to