diff options
| author | Cy Schubert <cy@FreeBSD.org> | 2003-03-21 00:54:06 +0000 |
|---|---|---|
| committer | Cy Schubert <cy@FreeBSD.org> | 2003-03-21 00:54:06 +0000 |
| commit | af7a454fd3da00363fde4728708eb83d5e734230 (patch) | |
| tree | 8dc748b7f3a65ad37e15622ed189237948b2c5db /security/krb5-appl/files/patch-kdc::do_tgs_req.c | |
| parent | Remove special USER_H override. (diff) | |
Patches from:
- MITKRB5-SA-2003-005:
Buffer overrun and underrun in principal name handling
- MITKRB5-SA-2003-004:
Cryptographic weaknesses in Kerberos v4 protocol; KDC and realm
compromise possible.
- MITKRB5-SA-2003-003:
Faulty length checks in xdrmem_getbytes may allow kadmind DoS.
- Additional patches from RedHat.
Approved by: kris (wearing his portmgr hat)
Obtained from: MIT Website and Nalin Dahyabhai <nalin@redhat.com>
Diffstat (limited to 'security/krb5-appl/files/patch-kdc::do_tgs_req.c')
| -rw-r--r-- | security/krb5-appl/files/patch-kdc::do_tgs_req.c | 12 |
1 files changed, 12 insertions, 0 deletions
diff --git a/security/krb5-appl/files/patch-kdc::do_tgs_req.c b/security/krb5-appl/files/patch-kdc::do_tgs_req.c new file mode 100644 index 000000000000..58e41c08a5e7 --- /dev/null +++ b/security/krb5-appl/files/patch-kdc::do_tgs_req.c @@ -0,0 +1,12 @@ +diff -ur krb5-1.2.7/src/kdc/do_tgs_req.c krb5-1.2.7/src/kdc/do_tgs_req.c +--- kdc/do_tgs_req.c 2003-02-03 15:24:58.000000000 -0500 ++++ kdc/do_tgs_req.c 2003-02-03 17:54:27.000000000 -0500 +@@ -180,7 +180,7 @@ + krb5_data *tgs_1 = + krb5_princ_component(kdc_context, tgs_server, 1); + +- if (server_1->length != tgs_1->length || ++ if (!tgs_1 || server_1->length != tgs_1->length || + memcmp(server_1->data, tgs_1->data, tgs_1->length)) { + krb5_db_free_principal(kdc_context, &server, nprincs); + find_alternate_tgs(request, &server, &more, &nprincs); |
