diff --git a/client/X11/xf_utils.c b/client/X11/xf_utils.c index 6d5e73888..e18182c60 100644 --- a/client/X11/xf_utils.c +++ b/client/X11/xf_utils.c @@ -203,7 +203,7 @@ BOOL run_action_script(xfContext* xfc, const char* what, const char* arg, fn_act if (!keyScript) { - WLog_ERR(TAG, "Failed to execute '%s'", command); + WLog_ERR(TAG, "[ActionScript] Failed to execute '%s'", command); goto fail; } @@ -223,6 +223,8 @@ BOOL run_action_script(xfContext* xfc, const char* what, const char* arg, fn_act } rc = read_data; + if (!rc) + WLog_ERR(TAG, "[ActionScript] No data returned from command '%s'", command); fail: if (keyScript) pclose(keyScript); diff --git a/winpr/libwinpr/sspi/Kerberos/kerberos.c b/winpr/libwinpr/sspi/Kerberos/kerberos.c index b8dbf21db..97e65e24d 100644 --- a/winpr/libwinpr/sspi/Kerberos/kerberos.c +++ b/winpr/libwinpr/sspi/Kerberos/kerberos.c @@ -1361,7 +1361,10 @@ static SECURITY_STATUS SEC_ENTRY kerberos_AcceptSecurityContext( (!realm || krb_log_exec_bool(krb5_realm_compare, credentials->ctx, principal, entry.principal))) break; - if (krb_log_exec(krb5glue_free_keytab_entry_contents, credentials->ctx, &entry)) + const krb5_error_code res = + krb_log_exec(krb5glue_free_keytab_entry_contents, credentials->ctx, &entry); + memset(&entry, 0, sizeof(entry)); + if (res != 0) goto cleanup; } while (1);