diff options
| author | Cy Schubert <cy@FreeBSD.org> | 2003-03-21 00:54:06 +0000 |
|---|---|---|
| committer | Cy Schubert <cy@FreeBSD.org> | 2003-03-21 00:54:06 +0000 |
| commit | af7a454fd3da00363fde4728708eb83d5e734230 (patch) | |
| tree | 8dc748b7f3a65ad37e15622ed189237948b2c5db /security/krb5-appl/files/patch-clients::ksu::krb_auth_su.c | |
| parent | Remove special USER_H override. (diff) | |
Patches from:
- MITKRB5-SA-2003-005:
Buffer overrun and underrun in principal name handling
- MITKRB5-SA-2003-004:
Cryptographic weaknesses in Kerberos v4 protocol; KDC and realm
compromise possible.
- MITKRB5-SA-2003-003:
Faulty length checks in xdrmem_getbytes may allow kadmind DoS.
- Additional patches from RedHat.
Approved by: kris (wearing his portmgr hat)
Obtained from: MIT Website and Nalin Dahyabhai <nalin@redhat.com>
Notes
Notes:
svn path=/head/; revision=77170
Diffstat (limited to 'security/krb5-appl/files/patch-clients::ksu::krb_auth_su.c')
| -rw-r--r-- | security/krb5-appl/files/patch-clients::ksu::krb_auth_su.c | 13 |
1 files changed, 13 insertions, 0 deletions
diff --git a/security/krb5-appl/files/patch-clients::ksu::krb_auth_su.c b/security/krb5-appl/files/patch-clients::ksu::krb_auth_su.c new file mode 100644 index 000000000000..150551765d3d --- /dev/null +++ b/security/krb5-appl/files/patch-clients::ksu::krb_auth_su.c @@ -0,0 +1,13 @@ +--- clients/ksu/krb_auth_su.c.orig Mon Dec 6 13:56:09 1999 ++++ clients/ksu/krb_auth_su.c Tue Feb 25 19:54:14 2003 +@@ -620,7 +620,9 @@ + krb5_princ_realm(context, temp_client)->length))){ + + +- if(nelem){ ++ if(nelem && ++ (krb5_princ_size(context, *client) > 0) && ++ (krb5_princ_size(context, temp_client) > 0)){ + krb5_data *p1 = + krb5_princ_component(context, *client, 0); + krb5_data *p2 = |
