Fix Kerberos issue in ssl_session_dup
The fix for CVE-2015-1791 introduced an error in ssl_session_dup for Kerberos. Reviewed-by: Tim Hudson <tjh@openssl.org> (cherry picked from commit dcad51bc13c9b716d9a66248bcc4038c071ff158)
This commit is contained in:
parent
cb972a4fe7
commit
106a9a5d7e
@ -242,7 +242,7 @@ SSL_SESSION *ssl_session_dup(SSL_SESSION *src, int ticket)
|
|||||||
memcpy(dest, src, sizeof(*dest));
|
memcpy(dest, src, sizeof(*dest));
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_KRB5
|
#ifndef OPENSSL_NO_KRB5
|
||||||
dest->krb5_client_princ_len = dest->krb5_client_princ_len;
|
dest->krb5_client_princ_len = src->krb5_client_princ_len;
|
||||||
if (src->krb5_client_princ_len > 0)
|
if (src->krb5_client_princ_len > 0)
|
||||||
memcpy(dest->krb5_client_princ, src->krb5_client_princ,
|
memcpy(dest->krb5_client_princ, src->krb5_client_princ,
|
||||||
src->krb5_client_princ_len);
|
src->krb5_client_princ_len);
|
||||||
|
Loading…
x
Reference in New Issue
Block a user