Skip to content

Debianed/krb5client null safety#451

Open
debianed wants to merge 3 commits intoaltlinux:masterfrom
debianed:debianed/krb5client-null-safety
Open

Debianed/krb5client null safety#451
debianed wants to merge 3 commits intoaltlinux:masterfrom
debianed:debianed/krb5client-null-safety

Conversation

@debianed
Copy link

Found a likely cause of the crash: in Krb5Client::Krb5ClientImpl::kinit, when authentication fails, krb5_cc_destroy is first called on the existing cache, but the entry in the principal_cache_map remains with the "old" (already destroyed) pointer. Then, when the correct password is entered, this invalid pointer is reused, which can cause a crash (tested on Red OS 8.0).

- add redos/README_REDOS.md with RED OS build instructions
- add redos/admc-master-1.red80.patch for RED OS 8.0 adaptation
- add redos/admc-red80.spec to build RPM package
- add redos/admc_build_red80.sh to automate RED OS build flow
- establish initial ADMC packaging/porting baseline for RED OS 8.0
Apply patch for safe ccache destruction

- Use .value(principal, nullptr) and null-check before krb5_cc_destroy in kinit()
- Same in logout() to prevent crash if cache missing

Closes: #TODO-krb5-null-safety
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant