Files
heimdal/lib
Heath Kehoe 545b5b41ce Fix race condition with global _gsskrb5_keytab
gsskrb5_acceptor_start() was making a copy of the global pointer
_gsskrb5_keytab to use later. This invites a race condition where
another thread could call gsskrb5_register_acceptor_identity()
(thus invalidating the target of the copied pointer) before it is
used by gsskrb5_acceptor_start().

So instead, clone the keytab to a new one while protected by the
mutex lock (similar to get_keytab() in acquire_cred.c).

Signed-off-by: Nicolas Williams <nico@twosigma.com>
2016-11-10 18:32:15 -06:00
..
2016-04-16 16:58:08 -05:00
2016-11-08 16:13:14 -06:00
2016-11-09 15:36:04 +00:00
2016-11-08 15:41:38 -06:00
2014-08-22 20:57:24 -07:00
2014-04-25 02:42:17 +02:00
2016-02-26 01:04:31 -06:00
2016-11-08 15:48:40 -05:00
2015-03-21 15:44:48 -04:00
2016-08-11 14:53:25 -05:00
2014-02-18 08:34:32 -08:00
2015-03-21 15:44:48 -04:00