Files
heimdal/lib/gssapi/krb5
Heath Kehoe 545b5b41ce Fix race condition with global _gsskrb5_keytab
gsskrb5_acceptor_start() was making a copy of the global pointer
_gsskrb5_keytab to use later. This invites a race condition where
another thread could call gsskrb5_register_acceptor_identity()
(thus invalidating the target of the copied pointer) before it is
used by gsskrb5_acceptor_start().

So instead, clone the keytab to a new one while protected by the
mutex lock (similar to get_keytab() in acquire_cred.c).

Signed-off-by: Nicolas Williams <nico@twosigma.com>
2016-11-10 18:32:15 -06:00
..
2011-05-21 11:57:31 -07:00
2015-04-28 08:20:39 -07:00
2009-01-25 00:35:00 +00:00
2011-05-21 11:57:31 -07:00
2011-05-21 11:57:31 -07:00
2007-01-24 00:14:24 +00:00
2011-05-21 11:57:31 -07:00
2011-05-21 11:57:31 -07:00
2015-03-24 11:50:01 -05:00
2011-05-21 11:57:31 -07:00
2011-07-24 16:02:22 -07:00
2011-05-21 11:57:31 -07:00
2011-05-21 11:57:31 -07:00