summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorRich Megginson <rmeggins@redhat.com>2008-08-28 17:20:29 +0000
committerRich Megginson <rmeggins@redhat.com>2008-08-28 17:20:29 +0000
commitde090c124759c2a0c45b7c6e0eb0ee59c3f46a07 (patch)
treebdf1050f3f250a227865b917ecfb8d48f5b8b1a7
parent3d4d8fa431726747c091594b15ff1447ad4f795e (diff)
downloadds-de090c124759c2a0c45b7c6e0eb0ee59c3f46a07.tar.gz
ds-de090c124759c2a0c45b7c6e0eb0ee59c3f46a07.tar.xz
ds-de090c124759c2a0c45b7c6e0eb0ee59c3f46a07.zip
Resolves: bug 458668
Bug Description: Memory leaks in ids_sasl_user_search Reviewed by: nkinder (Thanks!) Fix Description: This leak occurs when we use the new regex based identity mapping to lookup the user bind dn based on the given user and user realm. There is a pblock allocated but not freed. Platforms tested: RHEL5, Fedora 8 Flag Day: no Doc impact: no QA impact: should be covered by regular nightly and manual testing New Tests integrated into TET: none
-rw-r--r--ldap/servers/slapd/saslbind.c6
1 files changed, 5 insertions, 1 deletions
diff --git a/ldap/servers/slapd/saslbind.c b/ldap/servers/slapd/saslbind.c
index cd0ef62e..a5a0692d 100644
--- a/ldap/servers/slapd/saslbind.c
+++ b/ldap/servers/slapd/saslbind.c
@@ -275,7 +275,11 @@ static void ids_sasl_user_search(
out:
- if (pb) slapi_free_search_results_internal(pb);
+ if (pb) {
+ slapi_free_search_results_internal(pb);
+ slapi_pblock_destroy(pb);
+ pb = NULL;
+ }
return;
}