Bug 852755 - Memory leak in cyrus-sasl sasl2-sample-server
Summary: Memory leak in cyrus-sasl sasl2-sample-server
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: cyrus-sasl
Version: 5.8
Hardware: Unspecified
OS: Unspecified
unspecified
medium
Target Milestone: rc
: ---
Assignee: Petr Lautrbach
QA Contact: BaseOS QE Security Team
URL:
Whiteboard:
Depends On:
Blocks: 921099
TreeView+ depends on / blocked
 
Reported: 2012-08-29 13:47 UTC by David Spurek
Modified: 2015-03-02 05:27 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
: 921099 (view as bug list)
Environment:
Last Closed: 2013-03-13 13:30:37 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description David Spurek 2012-08-29 13:47:22 UTC
Description of problem:
Memory leak in cyrus-sasl sasl2-sample-server, valgrind shows definitely lost: 11 bytes in 1 blocks.

==19720== 11 bytes in 1 blocks are definitely lost in loss record 4 of 37
==19720==    at 0x4A0610C: malloc (vg_replace_malloc.c:195)
==19720==    by 0x3DBF2798E1: strdup (in /lib64/libc-2.5.so)
==19720==    by 0x401580: ??? (in /usr/bin/sasl2-sample-server)
==19720==    by 0x401FB8: ??? (in /usr/bin/sasl2-sample-server)
==19720==    by 0x3DBF21D993: (below main) (in /lib64/libc-2.5.so)


Version-Release number of selected component (if applicable):
cyrus-sasl-2.1.22-7.el5_8.1

How reproducible:
always

Steps to Reproduce:
/etc/sasl2/smtpd.conf

pwcheck_method: auxprop
auxprop_plugin: sasldb
mech_list: DIGEST-MD5

1.saslpasswd2 -c admin
2.valgrind --leak-check=full sasl2-sample-server -p 8000 -s rcmd -m DIGEST-MD5
3.sasl2-sample-client -p 8000 -s rcmd -m DIGEST-MD5 localhost

  
Actual results:
memory leak

Expected results:
no memory leak

Additional info:

Comment 1 Petr Lautrbach 2013-03-13 13:30:37 UTC
I am sorry, but it is now too late in the RHEL-5 release cycle.
RHEL-5.10 (the next RHEL-5 minor release) is going to be the first
production phase 2 [1] release of RHEL-5. Since phase 2 we'll be
addressing only security and critical issues.

[1] https://access.redhat.com/support/policy/updates/errata/


Note You need to log in before you can comment on or make changes to this bug.