freebsd-ports/security/krb5-17/files/patch-lib::krb5::krb::srv_rcache.c
Cy Schubert af7a454fd3 Patches from:
- MITKRB5-SA-2003-005:
       Buffer overrun and underrun in principal name handling

  - MITKRB5-SA-2003-004:
       Cryptographic weaknesses in Kerberos v4 protocol; KDC and realm
       compromise possible.

  - MITKRB5-SA-2003-003:
       Faulty length checks in xdrmem_getbytes may allow kadmind DoS.

  - Additional patches from RedHat.

Approved by:	kris (wearing his portmgr hat)
Obtained from:	MIT Website and Nalin Dahyabhai <nalin@redhat.com>
2003-03-21 00:54:06 +00:00

13 lines
331 B
C

--- lib/krb5/krb/srv_rcache.c 1999-09-24 17:19:48.000000000 -0400
+++ lib/krb5/krb/srv_rcache.c 2003-02-03 19:29:32.000000000 -0500
@@ -48,6 +48,9 @@
unsigned long uid = geteuid();
#endif
+ if (piece == NULL)
+ return ENOMEM;
+
rcache = (krb5_rcache) malloc(sizeof(*rcache));
if (!rcache)
return ENOMEM;