krb5_get_in_tkt() (called by krb5_get_in_tkt_with_password()) may

eventually call krb5_free_principal() via krb5_free_creds_contents(),
(when it succeeds, in particular).  Check for the creds.server
already being freed, and don't free it again.
This commit is contained in:
thorpej 2000-08-09 17:44:18 +00:00
parent dec20dab0e
commit d35819d6e3
1 changed files with 4 additions and 3 deletions

View File

@ -1,4 +1,4 @@
/* $NetBSD: k5login.c,v 1.13 2000/08/02 05:58:35 thorpej Exp $ */
/* $NetBSD: k5login.c,v 1.14 2000/08/09 17:44:18 thorpej Exp $ */
/*-
* Copyright (c) 1990 The Regents of the University of California.
@ -38,7 +38,7 @@
#if 0
static char sccsid[] = "@(#)klogin.c 5.11 (Berkeley) 7/12/92";
#endif
__RCSID("$NetBSD: k5login.c,v 1.13 2000/08/02 05:58:35 thorpej Exp $");
__RCSID("$NetBSD: k5login.c,v 1.14 2000/08/09 17:44:18 thorpej Exp $");
#endif /* not lint */
#ifdef KERBEROS5
@ -299,7 +299,8 @@ k5login(pw, instance, localhost, password)
ccache,
&my_creds, 0);
krb5_free_principal(kcontext, server);
if (my_creds.server != NULL)
krb5_free_principal(kcontext, my_creds.server);
if (chown(&tkt_location[5], pw->pw_uid, pw->pw_gid) < 0)
syslog(LOG_ERR, "chown tkfile (%s): %m", &tkt_location[5]);