[openssl-commits] [openssl] OpenSSL_1_0_1-stable update

Matt Caswell matt at openssl.org
Wed Jun 10 09:06:52 UTC 2015


The branch OpenSSL_1_0_1-stable has been updated
       via  106a9a5d7e26e728a654d7424849081bd988d4a5 (commit)
      from  cb972a4fe710c3e07300cdd3e3c3d41a42fc9672 (commit)


- Log -----------------------------------------------------------------
commit 106a9a5d7e26e728a654d7424849081bd988d4a5
Author: Matt Caswell <matt at openssl.org>
Date:   Wed Jun 10 09:32:34 2015 +0100

    Fix Kerberos issue in ssl_session_dup
    
    The fix for CVE-2015-1791 introduced an error in ssl_session_dup for
    Kerberos.
    
    Reviewed-by: Tim Hudson <tjh at openssl.org>
    (cherry picked from commit dcad51bc13c9b716d9a66248bcc4038c071ff158)

-----------------------------------------------------------------------

Summary of changes:
 ssl/ssl_sess.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/ssl/ssl_sess.c b/ssl/ssl_sess.c
index e673f9c..8325cb3 100644
--- a/ssl/ssl_sess.c
+++ b/ssl/ssl_sess.c
@@ -242,7 +242,7 @@ SSL_SESSION *ssl_session_dup(SSL_SESSION *src, int ticket)
     memcpy(dest, src, sizeof(*dest));
 
 #ifndef OPENSSL_NO_KRB5
-    dest->krb5_client_princ_len = dest->krb5_client_princ_len;
+    dest->krb5_client_princ_len = src->krb5_client_princ_len;
     if (src->krb5_client_princ_len > 0)
         memcpy(dest->krb5_client_princ, src->krb5_client_princ,
                src->krb5_client_princ_len);


More information about the openssl-commits mailing list