diff options
author | Matt Caswell <matt@openssl.org> | 2015-06-10 09:32:34 +0100 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2015-06-10 10:03:42 +0100 |
commit | 9545eac45bc79496763d2ded02629f88a8629fb9 (patch) | |
tree | a752d1720463c648663ad0badbd6047e8d2ff4e2 | |
parent | 228806a4f3c42cfb304b974a267a95f7a12cba87 (diff) | |
download | openssl-9545eac45bc79496763d2ded02629f88a8629fb9.tar.gz |
Fix Kerberos issue in ssl_session_dup
The fix for CVE-2015-1791 introduced an error in ssl_session_dup for
Kerberos.
Reviewed-by: Tim Hudson <tjh@openssl.org>
(cherry picked from commit dcad51bc13c9b716d9a66248bcc4038c071ff158)
-rw-r--r-- | ssl/ssl_sess.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/ssl/ssl_sess.c b/ssl/ssl_sess.c index 98b9107b5a..1fb682a9b3 100644 --- a/ssl/ssl_sess.c +++ b/ssl/ssl_sess.c @@ -239,7 +239,7 @@ SSL_SESSION *ssl_session_dup(SSL_SESSION *src, int ticket) memcpy(dest, src, sizeof(*dest)); #ifndef OPENSSL_NO_KRB5 - dest->krb5_client_princ_len = dest->krb5_client_princ_len; + dest->krb5_client_princ_len = src->krb5_client_princ_len; if (src->krb5_client_princ_len > 0) memcpy(dest->krb5_client_princ, src->krb5_client_princ, src->krb5_client_princ_len); |