From af7a454fd3da00363fde4728708eb83d5e734230 Mon Sep 17 00:00:00 2001 From: Cy Schubert Date: Fri, 21 Mar 2003 00:54:06 +0000 Subject: Patches from: - MITKRB5-SA-2003-005: Buffer overrun and underrun in principal name handling - MITKRB5-SA-2003-004: Cryptographic weaknesses in Kerberos v4 protocol; KDC and realm compromise possible. - MITKRB5-SA-2003-003: Faulty length checks in xdrmem_getbytes may allow kadmind DoS. - Additional patches from RedHat. Approved by: kris (wearing his portmgr hat) Obtained from: MIT Website and Nalin Dahyabhai --- security/krb5-16/files/patch-kdc::kdc_util.h | 15 +++++++++++++++ 1 file changed, 15 insertions(+) create mode 100644 security/krb5-16/files/patch-kdc::kdc_util.h (limited to 'security/krb5-16/files/patch-kdc::kdc_util.h') diff --git a/security/krb5-16/files/patch-kdc::kdc_util.h b/security/krb5-16/files/patch-kdc::kdc_util.h new file mode 100644 index 000000000000..262f3ff8cb29 --- /dev/null +++ b/security/krb5-16/files/patch-kdc::kdc_util.h @@ -0,0 +1,15 @@ +Index: kdc/kdc_util.h +=================================================================== +RCS file: /cvs/krbdev/krb5/src/kdc/kdc_util.h,v +retrieving revision 5.44.4.1 +diff -u -r5.44.4.1 kdc_util.h +--- kdc/kdc_util.h 2001/10/13 00:12:26 5.44.4.1 ++++ kdc/kdc_util.h 2002/10/15 23:32:45 +@@ -183,6 +183,7 @@ + const krb5_fulladdr *, + int is_secondary, + krb5_data **)); ++void enable_v4_crossrealm(char *); + #else + #define process_v4(foo,bar,quux,foobar) KRB5KRB_AP_ERR_BADVERSION + #endif -- cgit v1.2.3