Bug 729067

Summary: klist -s segfaults with expired credentials
Product: Red Hat Enterprise Linux 5 Reporter: gyuyjxz5kv
Component: krb5Assignee: Nalin Dahyabhai <nalin>
Status: CLOSED ERRATA QA Contact: BaseOS QE Security Team <qe-baseos-security>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 5.5CC: dpal, jplans, prc
Target Milestone: rc   
Target Release: ---   
Hardware: x86_64   
OS: Linux   
URL: http://krbdev.mit.edu/rt/Ticket/Display.html?id=6915
Whiteboard:
Fixed In Version: krb5-1.6.1-64.el5 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2012-02-21 03:19:41 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description gyuyjxz5kv 2011-08-08 16:23:50 UTC
Description of problem:

With expired credentials, klist -s produces a segfault.

Version-Release number of selected component (if applicable):
krb5 1.6.1-55.el5_6.1

How reproducible: every time

Steps to Reproduce:
1.kinit to get kerberos credentials
2.let the credentials expire
3.klist -s
  
Actual results: segfault

Expected results: return with status code 1


Additional info
Looks like https://bugzilla.redhat.com/show_bug.cgi?format=multiple&id=707145
which has been fixed in Fedora.

Comment 7 errata-xmlrpc 2012-02-21 03:19:41 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHSA-2012-0306.html