summaryrefslogtreecommitdiff
path: root/security/krb5-appl/files/patch-kdc::do_tgs_req.c
diff options
context:
space:
mode:
authorCy Schubert <cy@FreeBSD.org>2003-03-21 00:54:06 +0000
committerCy Schubert <cy@FreeBSD.org>2003-03-21 00:54:06 +0000
commitaf7a454fd3da00363fde4728708eb83d5e734230 (patch)
tree8dc748b7f3a65ad37e15622ed189237948b2c5db /security/krb5-appl/files/patch-kdc::do_tgs_req.c
parentRemove special USER_H override. (diff)
Patches from:
- MITKRB5-SA-2003-005: Buffer overrun and underrun in principal name handling - MITKRB5-SA-2003-004: Cryptographic weaknesses in Kerberos v4 protocol; KDC and realm compromise possible. - MITKRB5-SA-2003-003: Faulty length checks in xdrmem_getbytes may allow kadmind DoS. - Additional patches from RedHat. Approved by: kris (wearing his portmgr hat) Obtained from: MIT Website and Nalin Dahyabhai <nalin@redhat.com>
Diffstat (limited to 'security/krb5-appl/files/patch-kdc::do_tgs_req.c')
-rw-r--r--security/krb5-appl/files/patch-kdc::do_tgs_req.c12
1 files changed, 12 insertions, 0 deletions
diff --git a/security/krb5-appl/files/patch-kdc::do_tgs_req.c b/security/krb5-appl/files/patch-kdc::do_tgs_req.c
new file mode 100644
index 000000000000..58e41c08a5e7
--- /dev/null
+++ b/security/krb5-appl/files/patch-kdc::do_tgs_req.c
@@ -0,0 +1,12 @@
+diff -ur krb5-1.2.7/src/kdc/do_tgs_req.c krb5-1.2.7/src/kdc/do_tgs_req.c
+--- kdc/do_tgs_req.c 2003-02-03 15:24:58.000000000 -0500
++++ kdc/do_tgs_req.c 2003-02-03 17:54:27.000000000 -0500
+@@ -180,7 +180,7 @@
+ krb5_data *tgs_1 =
+ krb5_princ_component(kdc_context, tgs_server, 1);
+
+- if (server_1->length != tgs_1->length ||
++ if (!tgs_1 || server_1->length != tgs_1->length ||
+ memcmp(server_1->data, tgs_1->data, tgs_1->length)) {
+ krb5_db_free_principal(kdc_context, &server, nprincs);
+ find_alternate_tgs(request, &server, &more, &nprincs);