aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTomas Kuthan <tkuthan@gmail.com>2017-05-16 11:24:40 +0200
committerGreg Hudson <ghudson@mit.edu>2017-07-17 18:51:59 -0400
commit856ae7d866f7d89b367acf1b81118bf19e51a2e9 (patch)
tree9d52603d29045011174260b56968eb4f798f5f10
parenta72e99d479e772f540ff74617f4fa65967f5dd17 (diff)
downloadkrb5-856ae7d866f7d89b367acf1b81118bf19e51a2e9.zip
krb5-856ae7d866f7d89b367acf1b81118bf19e51a2e9.tar.gz
krb5-856ae7d866f7d89b367acf1b81118bf19e51a2e9.tar.bz2
Free GSS checksum data deterministically
In the normal course of execution, md5.contents allocated by kg_checksum_channel_bindings() in make_ap_req_v1() is freed in make_gss_checksum(). But when there is a failure in krb5_mk_req_extended() or in make_gss_checksum() before free is called, the memory leaks. This patch frees the memory unconditionally in make_ap_req_v1(). (cherry picked from commit 29337e7c7b796685fb6a03466d32147e17aa2d16) ticket: 8584 version_fixed: 1.14.6
-rw-r--r--src/lib/gssapi/krb5/init_sec_context.c4
1 files changed, 1 insertions, 3 deletions
diff --git a/src/lib/gssapi/krb5/init_sec_context.c b/src/lib/gssapi/krb5/init_sec_context.c
index 4d05d78..3c2d0bf 100644
--- a/src/lib/gssapi/krb5/init_sec_context.c
+++ b/src/lib/gssapi/krb5/init_sec_context.c
@@ -352,9 +352,6 @@ make_gss_checksum (krb5_context context, krb5_auth_context auth_context,
TWRITE_STR(ptr, data->md5.contents, data->md5.length);
TWRITE_INT(ptr, data->ctx->gss_flags, 0);
- /* done with this, free it */
- xfree(data->md5.contents);
-
if (credmsg.data) {
TWRITE_INT16(ptr, KRB5_GSS_FOR_CREDS_OPTION, 0);
TWRITE_INT16(ptr, credmsg.length, 0);
@@ -426,6 +423,7 @@ make_ap_req_v1(context, ctx, cred, k_cred, ad_context,
code = krb5_mk_req_extended(context, &ctx->auth_context, mk_req_flags,
NULL, k_cred, &ap_req);
krb5_auth_con_set_authdata_context(context, ctx->auth_context, NULL);
+ krb5_free_checksum_contents(context, &cksum_struct.md5);
krb5_free_data_contents(context, &cksum_struct.checksum_data);
if (code)
goto cleanup;