[30413] in CVS-changelog-for-Kerberos-V5

home help back first fref pref prev next nref lref last post

krb5 commit [krb5-1.17]: Fix double-close in ksu

daemon@ATHENA.MIT.EDU (Greg Hudson)
Mon Jan 7 11:20:12 2019

Date: Mon, 7 Jan 2019 11:19:18 -0500
From: Greg Hudson <ghudson@mit.edu>
Message-ID: <201901071619.x07GJIMw028010@drugstore.mit.edu>
To: <cvs-krb5@mit.edu>
MIME-Version: 1.0
Reply-To: krbdev@mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: cvs-krb5-bounces@mit.edu

https://github.com/krb5/krb5/commit/5f7baac58b77b038eba500e9067410ca19722369
commit 5f7baac58b77b038eba500e9067410ca19722369
Author: Robbie Harwood <rharwood@redhat.com>
Date:   Tue Dec 18 15:18:13 2018 -0500

    Fix double-close in ksu get_authorized_princ_names
    
    If list_union() fails due to an allocation failure, then close_time()
    will attempt to fclose users_fp and login_fp a second time.
    
    This bug was originally introduced in commit
    be95b52c2d0c21b1fe92f9f90166fc2fa8eecc95, and has been present in
    every krb5 release since 1.1.
    
    (cherry picked from commit 0b8c6f3e1e8e561aa56a7d4e2171320119991dae)
    
    ticket: 8768
    version_fixed: 1.17

 src/clients/ksu/heuristic.c |    1 -
 1 files changed, 0 insertions(+), 1 deletions(-)

diff --git a/src/clients/ksu/heuristic.c b/src/clients/ksu/heuristic.c
index 0d055e4..3eb28ab 100644
--- a/src/clients/ksu/heuristic.c
+++ b/src/clients/ksu/heuristic.c
@@ -266,7 +266,6 @@ get_authorized_princ_names(luser, cmd, princ_list)
 
     retval = list_union(k5login_list, k5users_filt_list, &combined_list);
     if (retval){
-        close_time(k5users_flag,users_fp, k5login_flag,login_fp);
         return retval;
     }
     *princ_list = combined_list;
_______________________________________________
cvs-krb5 mailing list
cvs-krb5@mit.edu
https://mailman.mit.edu/mailman/listinfo/cvs-krb5

home help back first fref pref prev next nref lref last post