pkgsrc/security/mit-krb5/patches/patch-at
salo f3624b6351 Security fix for CVE-2006-6143:
"An unauthenticated user may cause execution of arbitrary code in
 kadmind, which can compromise the Kerberos key database and host
 security.  (kadmind usually runs as root.)  Unsuccessful exploitation,
 or even accidental replication of the required conditions by
 non-malicious users, can result in kadmind crashing."

http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-002-rpc.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6143

Patch from MIT.
2007-01-17 23:43:47 +00:00

25 lines
657 B
Text

$NetBSD: patch-at,v 1.1 2007/01/17 23:43:47 salo Exp $
Security fix for CVE-2006-6143.
--- lib/rpc/svc.c.orig 2004-09-21 20:20:15.000000000 +0200
+++ lib/rpc/svc.c 2007-01-17 21:58:10.000000000 +0100
@@ -436,6 +436,8 @@ svc_getreqset(FDSET_TYPE *readfds)
#endif
}
+extern struct svc_auth_ops svc_auth_gss_ops;
+
static void
svc_do_xprt(SVCXPRT *xprt)
{
@@ -517,6 +519,9 @@ svc_do_xprt(SVCXPRT *xprt)
if ((stat = SVC_STAT(xprt)) == XPRT_DIED){
SVC_DESTROY(xprt);
break;
+ } else if ((xprt->xp_auth != NULL) &&
+ (xprt->xp_auth->svc_ah_ops != &svc_auth_gss_ops)) {
+ xprt->xp_auth = NULL;
}
} while (stat == XPRT_MOREREQS);