krb5_walk_realm_tree leaks in capaths case
authorTom Yu <tlyu@mit.edu>
Mon, 18 Jun 2007 21:07:37 +0000 (21:07 +0000)
committerTom Yu <tlyu@mit.edu>
Mon, 18 Jun 2007 21:07:37 +0000 (21:07 +0000)
commit073cf9a9bcbe0f194990fcf199bad688f161a6c7
treeeff9cac4e645de6d0ce2c6d2cf6420a781094965
parentb7895cf55e58fe12f7b33dcf8558daaff316df5e
krb5_walk_realm_tree leaks in capaths case

Markus Moeller reports a leak in krb5_get_credentials() which was then
traced down to profile strings leaking from within
krb5_walk_realm_tree().  A pointer to a profile string was getting
overwritten without the string being freed when *cap_nodes[0] == '.'.
Fix is to free the string prior to overwriting the pointer if the
pointer is non-null.

ticket: new
target_version: 1.6.2
tags: pullup

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@19582 dc483132-0cff-0310-8789-dd5450dbe970
src/lib/krb5/krb/walk_rtree.c