Fix Kerberos issue in ssl_session_dup
authorMatt Caswell <matt@openssl.org>
Wed, 10 Jun 2015 08:32:34 +0000 (09:32 +0100)
committerMatt Caswell <matt@openssl.org>
Wed, 10 Jun 2015 08:37:01 +0000 (09:37 +0100)
The fix for CVE-2015-1791 introduced an error in ssl_session_dup for
Kerberos.

Reviewed-by: Tim Hudson <tjh@openssl.org>
ssl/ssl_sess.c

index ca5d2d656eae51446fa81971fff1dc58bf5befac..5358f4a93a33f03f6928db12ec919906a94a5f1e 100644 (file)
@@ -242,7 +242,7 @@ SSL_SESSION *ssl_session_dup(SSL_SESSION *src, int ticket)
     memcpy(dest, src, sizeof(*dest));
 
 #ifndef OPENSSL_NO_KRB5
-    dest->krb5_client_princ_len = dest->krb5_client_princ_len;
+    dest->krb5_client_princ_len = src->krb5_client_princ_len;
     if (src->krb5_client_princ_len > 0)
         memcpy(dest->krb5_client_princ, src->krb5_client_princ,
                src->krb5_client_princ_len);