From: Greg Hudson Date: Wed, 29 Jun 2016 01:38:57 +0000 (-0400) Subject: Fix leak in FAST OTP client processing X-Git-Tag: krb5-1.15-beta1~107 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=7029efc11525299b87b9024280ef1d9f82059ec5;p=thirdparty%2Fkrb5.git Fix leak in FAST OTP client processing In set_pa_data(), after encoding the OTP request and stealing the pointer from the resulting krb5_data object, free the krb5_data container. ticket: 8443 (new) target_version: 1.14-next target_version: 1.13-next tags: pullup --- diff --git a/src/lib/krb5/krb/preauth_otp.c b/src/lib/krb5/krb/preauth_otp.c index 01c48b40f3..48fcbb5d53 100644 --- a/src/lib/krb5/krb/preauth_otp.c +++ b/src/lib/krb5/krb/preauth_otp.c @@ -835,6 +835,7 @@ set_pa_data(const krb5_pa_otp_req *req, krb5_pa_data ***pa_data_out) goto error; out[0]->contents = (krb5_octet *)tmp->data; out[0]->length = tmp->length; + free(tmp); *pa_data_out = out; return 0;