KRB5: fix mem leak in authenticate_stored_users()#8517
KRB5: fix mem leak in authenticate_stored_users()#8517alexey-tikhonov wants to merge 2 commits intoSSSD:masterfrom
authenticate_stored_users()#8517Conversation
There was a problem hiding this comment.
Code Review
This pull request addresses a memory leak in authenticate_stored_users by adding calls to hash_destroy for uid_table on all exit paths. My review focuses on ensuring the correctness of these additions. I've identified a couple of areas for improvement regarding error handling for the newly added cleanup calls.
|
Hi, thank you for digging this issue up and fixing it. But it looks that currently bye, |
ffdaa08 to
b09f2fc
Compare
|
(rebase) |
Thanks, fixed. |
|
/gemini review |
There was a problem hiding this comment.
Code Review
This pull request addresses a memory leak in authenticate_stored_users() by ensuring the uid_table hash table is properly deallocated. The changes in krb5_delayed_online_authentication.c add the necessary calls to hash_destroy() on all exit paths of the function. The modification in get_uid_table() in find_uid.c enhances error handling by cleaning up the hash table upon failure, which prevents memory leaks in its callers. The changes are correct and effectively resolve the identified memory leak.
sumit-bose
left a comment
There was a problem hiding this comment.
Hi,
thank you for the update, ACK.
bye,
Sumit
|
Note: Covscan is green. |
No description provided.