|
|
31affc |
From de03e7456108de3f3d28c6a5d33926525b70557f Mon Sep 17 00:00:00 2001
|
|
|
92192e |
From: Mark Reynolds <mreynolds@redhat.com>
|
|
|
92192e |
Date: Thu, 30 Aug 2018 14:28:10 -0400
|
|
|
92192e |
Subject: [PATCH] Ticket 49932 - Crash in delete_passwdPolicy when persistent
|
|
|
92192e |
search connections are terminated unexpectedly
|
|
|
92192e |
|
|
|
92192e |
Bug Description: We clone a pblock in a psearch search, and under certain
|
|
|
92192e |
error conditions this pblock is freed, but it frees the
|
|
|
92192e |
password policy struct which can lead to a double free
|
|
|
92192e |
when the original pblock is destroyed.
|
|
|
92192e |
|
|
|
92192e |
Fix Description: During the cloning, set the pwppolicy struct to NULL
|
|
|
92192e |
so the clone allocates its own policy if needed
|
|
|
92192e |
|
|
|
92192e |
https://pagure.io/389-ds-base/issue/49932
|
|
|
92192e |
|
|
|
92192e |
Reviewed by: ?
|
|
|
92192e |
|
|
|
92192e |
(cherry picked from commit 78fc627accacfa4061ce48977e22301f81ea8d73)
|
|
|
92192e |
---
|
|
|
92192e |
ldap/servers/slapd/pblock.c | 2 ++
|
|
|
92192e |
1 file changed, 2 insertions(+)
|
|
|
92192e |
|
|
|
92192e |
diff --git a/ldap/servers/slapd/pblock.c b/ldap/servers/slapd/pblock.c
|
|
|
92192e |
index 4514c3ce6..bc18a7b18 100644
|
|
|
92192e |
--- a/ldap/servers/slapd/pblock.c
|
|
|
92192e |
+++ b/ldap/servers/slapd/pblock.c
|
|
|
92192e |
@@ -322,6 +322,8 @@ slapi_pblock_clone(Slapi_PBlock *pb)
|
|
|
92192e |
if (pb->pb_intop != NULL) {
|
|
|
92192e |
_pblock_assert_pb_intop(new_pb);
|
|
|
92192e |
*(new_pb->pb_intop) = *(pb->pb_intop);
|
|
|
92192e |
+ /* set pwdpolicy to NULL so this clone allocates its own policy */
|
|
|
92192e |
+ new_pb->pb_intop->pwdpolicy = NULL;
|
|
|
92192e |
}
|
|
|
92192e |
if (pb->pb_intplugin != NULL) {
|
|
|
92192e |
_pblock_assert_pb_intplugin(new_pb);
|
|
|
92192e |
--
|
|
|
92192e |
2.17.1
|
|
|
92192e |
|