From 2c269c648168a488229539e921aa28e930df44c1 Mon Sep 17 00:00:00 2001 From: David Smith Date: Wed, 11 Dec 2024 19:40:45 +0100 Subject: [PATCH] [Seckrb5] Avoid null pointer dereference (#2385) --- src/XrdSeckrb5/XrdSecProtocolkrb5.cc | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/src/XrdSeckrb5/XrdSecProtocolkrb5.cc b/src/XrdSeckrb5/XrdSecProtocolkrb5.cc index 6fd79400901..ddc9f7117fa 100644 --- a/src/XrdSeckrb5/XrdSecProtocolkrb5.cc +++ b/src/XrdSeckrb5/XrdSecProtocolkrb5.cc @@ -510,7 +510,9 @@ int XrdSecProtocolkrb5::Authenticate(XrdSecCredentials *cred, {char* cpName; int ec; isCP = true; - if ((ec = krb5_unparse_name(krb_context, + if (!Ticket || !Ticket->enc_part2) + cPrincipal = "[principal not available]"; + else if ((ec = krb5_unparse_name(krb_context, (krb5_const_principal)Ticket->enc_part2->client, (char **)&cpName))) {char mBuff[1024];