krb5 commit [krb5-1.11]: Fix returning KDB_NOENTRY in find_alternate_tgs()
Tom Yu
tlyu at mit.edu
Fri Feb 6 17:26:55 EST 2015
https://github.com/krb5/krb5/commit/d91ca7782a2cd858333ce50273e600e58eeb773c
commit d91ca7782a2cd858333ce50273e600e58eeb773c
Author: Nalin Dahyabhai <nalin at dahyabhai.net>
Date: Thu Feb 20 16:01:49 2014 -0500
Fix returning KDB_NOENTRY in find_alternate_tgs()
After searching for a cross-realm TGS entry to provide to a client as a
referral, if we're all set to return a success code but aren't actually
returning an entry, we should be returning an error. We might not do so
because we don't compare the right value against NULL.
This corrects an error in a redundant check in the patch for
CVE-2013-1417. The error in the check cannot occur in practice
because the other part of the patch for CVE-2013-1417 prevents it, but
static analyzers can flag the erroneous check.
[tlyu at mit.edu: edit commit message]
(cherry picked from commit 90cbf4eb60d8ec3c083195ba4a050a31ea36be0b)
ticket: 8092 (new)
version_fixed: 1.11.6
status: resolved
src/kdc/do_tgs_req.c | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/src/kdc/do_tgs_req.c b/src/kdc/do_tgs_req.c
index e3fdce4..a90eeab 100644
--- a/src/kdc/do_tgs_req.c
+++ b/src/kdc/do_tgs_req.c
@@ -1063,7 +1063,7 @@ find_alternate_tgs(kdc_realm_t *kdc_active_realm, krb5_principal princ,
goto cleanup;
}
cleanup:
- if (retval == 0 && server_ptr == NULL)
+ if (retval == 0 && *server_ptr == NULL)
retval = KRB5_KDB_NOENTRY;
if (retval != 0)
*status = "UNKNOWN_SERVER";
More information about the cvs-krb5
mailing list