summaryrefslogtreecommitdiff
path: root/security/krb5-appl/files/patch-clients::ksu::krb_auth_su.c
diff options
context:
space:
mode:
authorCy Schubert <cy@FreeBSD.org>2003-03-21 00:54:06 +0000
committerCy Schubert <cy@FreeBSD.org>2003-03-21 00:54:06 +0000
commitaf7a454fd3da00363fde4728708eb83d5e734230 (patch)
tree8dc748b7f3a65ad37e15622ed189237948b2c5db /security/krb5-appl/files/patch-clients::ksu::krb_auth_su.c
parentRemove special USER_H override. (diff)
Patches from:
- MITKRB5-SA-2003-005: Buffer overrun and underrun in principal name handling - MITKRB5-SA-2003-004: Cryptographic weaknesses in Kerberos v4 protocol; KDC and realm compromise possible. - MITKRB5-SA-2003-003: Faulty length checks in xdrmem_getbytes may allow kadmind DoS. - Additional patches from RedHat. Approved by: kris (wearing his portmgr hat) Obtained from: MIT Website and Nalin Dahyabhai <nalin@redhat.com>
Notes
Notes: svn path=/head/; revision=77170
Diffstat (limited to 'security/krb5-appl/files/patch-clients::ksu::krb_auth_su.c')
-rw-r--r--security/krb5-appl/files/patch-clients::ksu::krb_auth_su.c13
1 files changed, 13 insertions, 0 deletions
diff --git a/security/krb5-appl/files/patch-clients::ksu::krb_auth_su.c b/security/krb5-appl/files/patch-clients::ksu::krb_auth_su.c
new file mode 100644
index 000000000000..150551765d3d
--- /dev/null
+++ b/security/krb5-appl/files/patch-clients::ksu::krb_auth_su.c
@@ -0,0 +1,13 @@
+--- clients/ksu/krb_auth_su.c.orig Mon Dec 6 13:56:09 1999
++++ clients/ksu/krb_auth_su.c Tue Feb 25 19:54:14 2003
+@@ -620,7 +620,9 @@
+ krb5_princ_realm(context, temp_client)->length))){
+
+
+- if(nelem){
++ if(nelem &&
++ (krb5_princ_size(context, *client) > 0) &&
++ (krb5_princ_size(context, temp_client) > 0)){
+ krb5_data *p1 =
+ krb5_princ_component(context, *client, 0);
+ krb5_data *p2 =