Bug 690595

Summary: Uninitialized variable in ipapwd_encoding.c
Product: Red Hat Enterprise Linux 6 Reporter: Rob Crittenden <rcritten>
Component: ipaAssignee: Rob Crittenden <rcritten>
Status: CLOSED ERRATA QA Contact: Chandrasekar Kannan <ckannan>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 6.1CC: benl, dpal, jgalipea, syeghiay
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: ipa-2.0.0-18.el6 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-05-19 13:44:47 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Rob Crittenden 2011-03-24 18:23:15 UTC
Description of problem:

In the function encrypt_encode_key() princ is not initialized. This would cause a crash if an uninitialized value is freed by krb5_free_principal(krbctx, princ).

Comment 1 Dmitri Pal 2011-03-24 19:03:37 UTC
https://fedorahosted.org/freeipa/ticket/1118

Comment 2 Rob Crittenden 2011-03-25 13:33:41 UTC
master: 8308efeb14baa26c64e97ee5ec3a01229c563856

Comment 4 Jenny Severance 2011-04-08 17:23:09 UTC
please add steps to reproduce this bug. Thanks!

Comment 5 Rob Crittenden 2011-04-11 14:23:44 UTC
We never experienced this bug, Coverity found it. It is not likely a request would get this far but if it did then it would have been possible to cause a crash.

Comment 7 Rob Crittenden 2011-04-12 17:06:04 UTC
Coverity is no longer reporting this as a possible bug, you may mark as verified.

Comment 8 Jenny Severance 2011-04-12 17:13:08 UTC
per comment #7, marking bug verified.

Comment 9 errata-xmlrpc 2011-05-19 13:44:47 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHEA-2011-0631.html