diff options
author | Simo Sorce <simo@redhat.com> | 2013-08-27 09:28:14 -0400 |
---|---|---|
committer | Petr Viktorin <pviktori@redhat.com> | 2013-08-28 12:42:56 +0200 |
commit | bea533c69a2b11e4a774144b8ee335e458333f7a (patch) | |
tree | 24f9489e6ac454de1e5ce0e384d46443cf00a214 /daemons/ipa-kdb | |
parent | f96257397e8f1cb8a307e6ec0e48bd3570a16671 (diff) | |
download | freeipa-bea533c69a2b11e4a774144b8ee335e458333f7a.tar.gz freeipa-bea533c69a2b11e4a774144b8ee335e458333f7a.tar.xz freeipa-bea533c69a2b11e4a774144b8ee335e458333f7a.zip |
kdb-princ: Fix memory leak
If we do not store the keys in the entry we need to free the array before
continuing or the data is leaked.
CoverityID: 11910
Fixes:
https://fedorahosted.org/freeipa/ticket/3884
Diffstat (limited to 'daemons/ipa-kdb')
-rw-r--r-- | daemons/ipa-kdb/ipa_kdb_principals.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/daemons/ipa-kdb/ipa_kdb_principals.c b/daemons/ipa-kdb/ipa_kdb_principals.c index 66d434a53..38059d29f 100644 --- a/daemons/ipa-kdb/ipa_kdb_principals.c +++ b/daemons/ipa-kdb/ipa_kdb_principals.c @@ -413,6 +413,7 @@ static krb5_error_code ipadb_parse_ldap_entry(krb5_context kcontext, if ((*active_ua & ~IPADB_USER_AUTH_DISABLED) != IPADB_USER_AUTH_EMPTY && !(*active_ua & IPADB_USER_AUTH_PASSWORD)) { /* This is the same behavior as ENOENT below. */ + ipa_krb5_free_key_data(res_key_data, result); break; } |