Bug 32591 - The memory block doubly freed in Heimdal Kerberos5
Summary: The memory block doubly freed in Heimdal Kerberos5
Status: Closed FIXED
Alias: None
Product: Base System
Classification: Unclassified
Component: bin (show other bugs)
Version: 5.0-CURRENT
Hardware: Any Any
: Normal Affects Only Me
Assignee: assar
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2001-12-07 22:30 UTC by ak03
Modified: 2002-07-22 20:20 UTC (History)
1 user (show)

See Also:


Attachments
file.diff (631 bytes, patch)
2001-12-07 22:30 UTC, ak03
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description ak03 2001-12-07 22:30:00 UTC
	The  /usr/src/crypto/heimdal/lib/krb5/keytab_any.c file contains the
	following code in function any_start_seq_get:

How-To-Repeat: 	N/A
Comment 1 Sheldon Hearn freebsd_committer freebsd_triage 2001-12-10 11:18:51 UTC
Responsible Changed
From-To: freebsd-bugs->markm

Over to Mr Kerberos.
Comment 2 ru freebsd_committer freebsd_triage 2002-01-29 07:54:09 UTC
Responsible Changed
From-To: markm->assar

Assar, could you please look into this PR? 

http://www.FreeBSD.org/cgi/query-pr.cgi?pr=32591 
B

Comment 3 ak03 2002-04-18 18:45:28 UTC
The bug has been fixed. Please close this PR.
Comment 4 Alexander Kabaev freebsd_committer freebsd_triage 2002-07-22 20:19:43 UTC
State Changed
From-To: open->closed

Latest heimdal import fixed the bug. Closed at originator request.