diff options
author | Jeremy Allison <jra@samba.org> | 2015-01-28 14:47:31 -0800 |
---|---|---|
committer | Karolin Seeger <kseeger@samba.org> | 2015-02-22 15:02:26 +0100 |
commit | 4661fa51de4915c96eeb61a74982519076a02c9b (patch) | |
tree | 6b1e362b362cd4e079da85fddf378a9e1218458d | |
parent | 6e1ba4cf362165a2c8120874bd6951615aef4599 (diff) | |
download | samba-4661fa51de4915c96eeb61a74982519076a02c9b.tar.gz |
CVE-2015-0240: s3: netlogon: Ensure we don't call talloc_free on an uninitialized pointer.
Bug: https://bugzilla.samba.org/show_bug.cgi?id=11077
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Stefan Metzmacher <metze@samba.org>
-rw-r--r-- | source3/rpc_server/netlogon/srv_netlog_nt.c | 6 |
1 files changed, 5 insertions, 1 deletions
diff --git a/source3/rpc_server/netlogon/srv_netlog_nt.c b/source3/rpc_server/netlogon/srv_netlog_nt.c index 3b1cdcff287..cf7cadac038 100644 --- a/source3/rpc_server/netlogon/srv_netlog_nt.c +++ b/source3/rpc_server/netlogon/srv_netlog_nt.c @@ -1070,6 +1070,10 @@ static NTSTATUS netr_creds_server_step_check(struct pipes_struct *p, NTSTATUS status; bool schannel_global_required = (lp_server_schannel() == true) ? true:false; + if (creds_out != NULL) { + *creds_out = NULL; + } + if (schannel_global_required) { status = schannel_check_required(&p->auth, computer_name, @@ -1205,7 +1209,7 @@ NTSTATUS _netr_ServerPasswordSet(struct pipes_struct *p, { NTSTATUS status = NT_STATUS_OK; int i; - struct netlogon_creds_CredentialState *creds; + struct netlogon_creds_CredentialState *creds = NULL; DEBUG(5,("_netr_ServerPasswordSet: %d\n", __LINE__)); |