Commit 106a9a5d authored by Matt Caswell's avatar Matt Caswell
Browse files

Fix Kerberos issue in ssl_session_dup



The fix for CVE-2015-1791 introduced an error in ssl_session_dup for
Kerberos.

Reviewed-by: default avatarTim Hudson <tjh@openssl.org>
(cherry picked from commit dcad51bc)
parent cb972a4f
Loading
Loading
Loading
Loading
+1 −1
Original line number Diff line number Diff line
@@ -242,7 +242,7 @@ SSL_SESSION *ssl_session_dup(SSL_SESSION *src, int ticket)
    memcpy(dest, src, sizeof(*dest));

#ifndef OPENSSL_NO_KRB5
    dest->krb5_client_princ_len = dest->krb5_client_princ_len;
    dest->krb5_client_princ_len = src->krb5_client_princ_len;
    if (src->krb5_client_princ_len > 0)
        memcpy(dest->krb5_client_princ, src->krb5_client_princ,
               src->krb5_client_princ_len);