Blame SOURCES/Zap-data-when-freeing-krb5_spake_factor.patch

c41359
From 5d970e16e768a134e65ee7cf367b8f34a80e0980 Mon Sep 17 00:00:00 2001
c41359
From: Greg Hudson <ghudson@mit.edu>
c41359
Date: Tue, 27 Mar 2018 15:42:28 -0400
c41359
Subject: [PATCH] Zap data when freeing krb5_spake_factor
c41359
c41359
krb5_spake_factor structures will sometimes hold sensitive data when
c41359
second-factor SPAKE is implemented, so should be zapped when freed.
c41359
c41359
ticket: 8647
c41359
(cherry picked from commit 9cc94a3f1ce06a4430f684300a747ec079102403)
c41359
---
c41359
 src/lib/krb5/krb/kfree.c | 4 +++-
c41359
 1 file changed, 3 insertions(+), 1 deletion(-)
c41359
c41359
diff --git a/src/lib/krb5/krb/kfree.c b/src/lib/krb5/krb/kfree.c
c41359
index e1ea1494a..71e7fcad0 100644
c41359
--- a/src/lib/krb5/krb/kfree.c
c41359
+++ b/src/lib/krb5/krb/kfree.c
c41359
@@ -897,7 +897,9 @@ k5_free_spake_factor(krb5_context context, krb5_spake_factor *val)
c41359
 {
c41359
     if (val == NULL)
c41359
         return;
c41359
-    krb5_free_data(context, val->data);
c41359
+    if (val->data != NULL)
c41359
+        zapfree(val->data->data, val->data->length);
c41359
+    free(val->data);
c41359
     free(val);
c41359
 }
c41359