[krbdev.mit.edu #1203] kinit -k -t segfaults
The RT System itself via RT
rt-comment at krbdev.mit.edu
Tue Oct 1 14:51:36 EDT 2002
>From hgm at lanl.gov Tue Oct 1 14:51:33 2002
Received: from fort-point-station.mit.edu (FORT-POINT-STATION.MIT.EDU [18.7.7.76]) by krbdev.mit.edu (8.9.3) with ESMTP
id OAA09053; Tue, 1 Oct 2002 14:51:33 -0400 (EDT)
From: hgm at lanl.gov
Received: from mailrelay2.lanl.gov (mailrelay2.lanl.gov [128.165.4.103])
by fort-point-station.mit.edu (8.9.2/8.9.2) with ESMTP id OAA07754
for <krb5-bugs at mit.edu>; Tue, 1 Oct 2002 14:51:32 -0400 (EDT)
Received: from moki.lanl.gov (localhost.localdomain [127.0.0.1])
by mailrelay2.lanl.gov (8.12.3/8.12.3/(ccn-5)) with ESMTP id g91IpWtv005823
for <krb5-bugs at mit.edu>; Tue, 1 Oct 2002 12:51:32 -0600
Received: (from root at localhost)
by moki.lanl.gov (8.9.3/8.9.3) id MAA21534;
Tue, 1 Oct 2002 12:51:20 -0600
Date: Tue, 1 Oct 2002 12:51:20 -0600
Message-Id: <200210011851.MAA21534 at moki.lanl.gov>
To: krb5-bugs at mit.edu
Subject: krb5-clients
Reply-To: hgm at lanl.gov
X-send-pr-version: 3.99
>Submitter-Id: net
>Originator: Harry G. McGavran Jr.
>Organization:
Los Alamos National Laboratory
>Confidential: no
>Synopsis: kinit -k -t segfaults
>Severity: critical
>Priority: high
>Category: krb5-clients
>Class: sw-bug
>Release: krb5-1.2.6
>Environment:
Linux, all flavors
System: Linux moki 2.2.21 #1 Mon Jul 1 11:10:05 MDT 2002 i686 unknown
Architecture: i686
>Description:
kinit with a keytab file seg faults (kinit -k -t file principal)
>How-To-Repeat:
kinit -k -t file principal
>Fix:
We patched our krb5-1.2.6 source tree with:
*** ./src/lib/krb5/krb/gic_keytab.c.orig Tue Apr 11 15:43:17 2000
--- ./src/lib/krb5/krb/gic_keytab.c Mon Sep 30 13:30:39 2002
***************
*** 25,31 ****
--- 25,39 ----
if (as_key->enctype == etype)
return(0);
+ #ifndef LANL
krb5_free_keyblock(context, as_key);
+ #else /* LANL */
+ /* krb5_free_keyblock frees as_key above and that is a local variable declared
+ * in krb5_get_init_creds() and used below as well, so it should NOT be
+ * freed, only the contents can be freed.
+ */
+ krb5_free_keyblock_contents(context, as_key);
+ #endif /* LANL */
as_key->length = 0;
}
More information about the krb5-bugs
mailing list