[16901] in Kerberos-V5-bugs
[krbdev.mit.edu #9103] git commit
daemon@ATHENA.MIT.EDU (Greg Hudson via RT)
Sat Sep 2 22:37:14 2023
From: "Greg Hudson via RT" <rt@krbdev.mit.edu>
In-Reply-To:
Message-ID: <rt-4.4.3-2-2149743-1693708624-368.9103-5-0@mit.edu>
To: "AdminCc of krbdev.mit.edu Ticket #9103":;
Date: Sat, 02 Sep 2023 22:37:04 -0400
MIME-Version: 1.0
Reply-To: rt@krbdev.mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu
<URL: https://krbdev.mit.edu/rt/Ticket/Display.html?id=9103 >
Fix krb5_cccol_have_content() bad pointer free
krb5_cccol_have_content() calls krb5_cc_get_principal() within a loop,
and frees the resulting principal on success or failure. Set princ to
null before each call to ensure we don't free a dangling pointer.
[ghudson@mit.edu: rewrote commit message; moved assignment for greater
clarity]
https://github.com/krb5/krb5/commit/635c8cca65b745476d07c1f5ff701445db25c10d
Author: Ilya Gladyshev <ilya.v.gladyshev@gmail.com>
Committer: Greg Hudson <ghudson@mit.edu>
Commit: 635c8cca65b745476d07c1f5ff701445db25c10d
Branch: master
src/lib/krb5/ccache/cccursor.c | 1 +
1 file changed, 1 insertion(+)
_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs