diff options
author | Cy Schubert <cy@FreeBSD.org> | 2003-03-21 00:54:06 +0000 |
---|---|---|
committer | Cy Schubert <cy@FreeBSD.org> | 2003-03-21 00:54:06 +0000 |
commit | af7a454fd3da00363fde4728708eb83d5e734230 (patch) | |
tree | 8dc748b7f3a65ad37e15622ed189237948b2c5db /security/krb5-17/files/patch-lib::krb5::krb::srv_rcache.c | |
parent | Remove special USER_H override. (diff) |
Patches from:
- MITKRB5-SA-2003-005:
Buffer overrun and underrun in principal name handling
- MITKRB5-SA-2003-004:
Cryptographic weaknesses in Kerberos v4 protocol; KDC and realm
compromise possible.
- MITKRB5-SA-2003-003:
Faulty length checks in xdrmem_getbytes may allow kadmind DoS.
- Additional patches from RedHat.
Approved by: kris (wearing his portmgr hat)
Obtained from: MIT Website and Nalin Dahyabhai <nalin@redhat.com>
Notes
Notes:
svn path=/head/; revision=77170
Diffstat (limited to 'security/krb5-17/files/patch-lib::krb5::krb::srv_rcache.c')
-rw-r--r-- | security/krb5-17/files/patch-lib::krb5::krb::srv_rcache.c | 12 |
1 files changed, 12 insertions, 0 deletions
diff --git a/security/krb5-17/files/patch-lib::krb5::krb::srv_rcache.c b/security/krb5-17/files/patch-lib::krb5::krb::srv_rcache.c new file mode 100644 index 000000000000..79e16f93110d --- /dev/null +++ b/security/krb5-17/files/patch-lib::krb5::krb::srv_rcache.c @@ -0,0 +1,12 @@ +--- lib/krb5/krb/srv_rcache.c 1999-09-24 17:19:48.000000000 -0400 ++++ lib/krb5/krb/srv_rcache.c 2003-02-03 19:29:32.000000000 -0500 +@@ -48,6 +48,9 @@ + unsigned long uid = geteuid(); + #endif + ++ if (piece == NULL) ++ return ENOMEM; ++ + rcache = (krb5_rcache) malloc(sizeof(*rcache)); + if (!rcache) + return ENOMEM; |