af7a454fd3
- MITKRB5-SA-2003-005: Buffer overrun and underrun in principal name handling - MITKRB5-SA-2003-004: Cryptographic weaknesses in Kerberos v4 protocol; KDC and realm compromise possible. - MITKRB5-SA-2003-003: Faulty length checks in xdrmem_getbytes may allow kadmind DoS. - Additional patches from RedHat. Approved by: kris (wearing his portmgr hat) Obtained from: MIT Website and Nalin Dahyabhai <nalin@redhat.com>
16 lines
747 B
Text
16 lines
747 B
Text
Index: include/krb5.hin
|
|
===================================================================
|
|
RCS file: /cvs/krbdev/krb5/src/include/krb5.hin,v
|
|
retrieving revision 1.94.2.5.2.17
|
|
diff -p -u -r1.94.2.5.2.17 krb5.hin
|
|
--- include/krb5.hin 2002/04/16 23:47:53 1.94.2.5.2.17
|
|
+++ include/krb5.hin 2003/03/19 00:38:54
|
|
@@ -326,7 +326,7 @@ typedef krb5_const krb5_principal_data F
|
|
#define krb5_princ_size(context, princ) (princ)->length
|
|
#define krb5_princ_type(context, princ) (princ)->type
|
|
#define krb5_princ_name(context, princ) (princ)->data
|
|
-#define krb5_princ_component(context, princ,i) ((princ)->data + i)
|
|
+#define krb5_princ_component(context, princ,i) (i < krb5_princ_size(context, princ) ? ((princ)->data + i) : NULL)
|
|
|
|
/*
|
|
* end "base-defs.h"
|