Memory leak in krb5-libs > 1.10.3-33

Solution Unverified - Updated -

Issue

  • On our nameserver nodes that the latest version of the kerberos libraries (1.10.3-37) is buggy and leaks memory.
  • The previous version (1.10.3-33) works ok.
  • We could reproduce the issue within valgrind, and here is the output of the loss :

==2217== 145,064 (3,072 direct, 141,992 indirect) bytes in 96 blocks are definitely lost in loss record 359 of 366 ==2217== at 0x4A06A2E: malloc (vg_replace_malloc.c:270) ==2217== by 0x3BCAC684D2: krb5_pac_init (pac.c:231) ==2217== by 0x3BCAC68B3D: krb5_pac_parse (pac.c:332) ==2217== by 0x18DBDC56: ??? ==2217== by 0x3BCAC50DB2: krb5int_authdata_verify (authdata.c:617) ==2217== by 0x3BCAC707CF: rd_req_decoded_opt (rd_req_dec.c:437) ==2217== by 0x3BCAC70859: krb5_rd_req_decoded (rd_req_dec.c:599) ==2217== by 0x3BCAC6F888: krb5_rd_req (rd_req.c:87) ==2217== by 0x3BCB81C770: kg_accept_krb5 (accept_sec_context.c:643) ==2217== by 0x3BCB81E0A9: krb5_gss_accept_sec_context_ext (accept_sec_context.c:1338) ==2217== by 0x3BCB81E208: krb5_gss_accept_sec_context (accept_sec_context.c:1367) ==2217== by 0x3BCB80DC22: gss_accept_sec_context (g_accept_sec_context.c:203) ==2217== by 0x18BB9738: Csec_server_establish_context_ext_KRB5 (Csec_plugin_GSS.c:482) ==2217== by 0x365BE02BC2: Csec_server_establish_context_ext_caller (Csec_plugin.h:129) ==2217== by 0x365BE0816A: Csec_server_establish_context_ext (Csec_api.c:277) ==2217== by 0x365BE07FE4: Csec_server_establishContext (Csec_api.c:218) ==2217== by 0x406447: doit (Cns_main.c:747) ==2217== by 0x365B628930: _Cpool_starter (Cpool.c:377) ==2217== by 0x365B623E24: _Cthread_start_pthread (Cthread.c:209) ==2217== by 0x3BC44079D0: start_thread (pthread_create.c:301) ==2217== by 0x3BC40E88FC: clone (clone.S:115) ----------------------
  • Also reproduced it with latest krb5-libs-1.10.3-42.

Environment

  • Red Hat Enterprise Linux 6
  • sssd-client 1.12.4-47.el6.x86_64
  • krb5-libs > 1.10.3-33

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content