[29556] in CVS-changelog-for-Kerberos-V5

home help back first fref pref prev next nref lref last post

krb5 commit: Fix leak in key change operations

daemon@ATHENA.MIT.EDU (Greg Hudson)
Wed Aug 10 13:56:11 2016

Date: Wed, 10 Aug 2016 13:51:43 -0400
From: Greg Hudson <ghudson@mit.edu>
Message-Id: <201608101751.u7AHphW1009537@drugstore.mit.edu>
To: cvs-krb5@mit.edu
Reply-To: krbdev@mit.edu
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: cvs-krb5-bounces@mit.edu

https://github.com/krb5/krb5/commit/19ad1a36f0c133725981edf3dde8fe078a8285b1
commit 19ad1a36f0c133725981edf3dde8fe078a8285b1
Author: Greg Hudson <ghudson@mit.edu>
Date:   Tue Jun 28 22:20:22 2016 -0400

    Fix leak in key change operations
    
    In preserve_one_old_key(), if the initial decryption in the current
    master key succeeds, free the decrypted keyblock contents before
    exiting.
    
    ticket: 8446 (new)
    target_version: 1.14-next
    target_version: 1.13-next
    tags: pullup

 src/lib/kdb/kdb_cpw.c |    1 +
 1 files changed, 1 insertions(+), 0 deletions(-)

diff --git a/src/lib/kdb/kdb_cpw.c b/src/lib/kdb/kdb_cpw.c
index ead06ec..03efc28 100644
--- a/src/lib/kdb/kdb_cpw.c
+++ b/src/lib/kdb/kdb_cpw.c
@@ -106,6 +106,7 @@ preserve_one_old_key(krb5_context context, krb5_keyblock *mkey,
         /* old_kd is already encrypted in mkey, so just move it. */
         *new_kd = *old_kd;
         memset(old_kd, 0, sizeof(*old_kd));
+        krb5_free_keyblock_contents(context, &kb);
         return 0;
     }
 
_______________________________________________
cvs-krb5 mailing list
cvs-krb5@mit.edu
https://mailman.mit.edu/mailman/listinfo/cvs-krb5

home help back first fref pref prev next nref lref last post