Fix Kerberos issue in ssl_session_dup
The fix for CVE-2015-1791 introduced an error in ssl_session_dup for
Kerberos.
Reviewed-by: Tim Hudson <tjh@openssl.org>
(cherry picked from commit dcad51bc13)
			
			
This commit is contained in:
		@@ -239,7 +239,7 @@ SSL_SESSION *ssl_session_dup(SSL_SESSION *src, int ticket)
 | 
			
		||||
    memcpy(dest, src, sizeof(*dest));
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
    dest->krb5_client_princ_len = dest->krb5_client_princ_len;
 | 
			
		||||
    dest->krb5_client_princ_len = src->krb5_client_princ_len;
 | 
			
		||||
    if (src->krb5_client_princ_len > 0)
 | 
			
		||||
        memcpy(dest->krb5_client_princ, src->krb5_client_princ,
 | 
			
		||||
               src->krb5_client_princ_len);
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user