freebsd-ports/security/krb5-appl/files/patch-clients::ksu::krb_auth_su.c
Cy Schubert af7a454fd3 Patches from:
- MITKRB5-SA-2003-005:
       Buffer overrun and underrun in principal name handling

  - MITKRB5-SA-2003-004:
       Cryptographic weaknesses in Kerberos v4 protocol; KDC and realm
       compromise possible.

  - MITKRB5-SA-2003-003:
       Faulty length checks in xdrmem_getbytes may allow kadmind DoS.

  - Additional patches from RedHat.

Approved by:	kris (wearing his portmgr hat)
Obtained from:	MIT Website and Nalin Dahyabhai <nalin@redhat.com>
2003-03-21 00:54:06 +00:00

13 lines
450 B
C

--- clients/ksu/krb_auth_su.c.orig Mon Dec 6 13:56:09 1999
+++ clients/ksu/krb_auth_su.c Tue Feb 25 19:54:14 2003
@@ -620,7 +620,9 @@
krb5_princ_realm(context, temp_client)->length))){
- if(nelem){
+ if(nelem &&
+ (krb5_princ_size(context, *client) > 0) &&
+ (krb5_princ_size(context, temp_client) > 0)){
krb5_data *p1 =
krb5_princ_component(context, *client, 0);
krb5_data *p2 =