af7a454fd3
- MITKRB5-SA-2003-005: Buffer overrun and underrun in principal name handling - MITKRB5-SA-2003-004: Cryptographic weaknesses in Kerberos v4 protocol; KDC and realm compromise possible. - MITKRB5-SA-2003-003: Faulty length checks in xdrmem_getbytes may allow kadmind DoS. - Additional patches from RedHat. Approved by: kris (wearing his portmgr hat) Obtained from: MIT Website and Nalin Dahyabhai <nalin@redhat.com>
13 lines
331 B
C
13 lines
331 B
C
--- lib/krb5/krb/srv_rcache.c 1999-09-24 17:19:48.000000000 -0400
|
|
+++ lib/krb5/krb/srv_rcache.c 2003-02-03 19:29:32.000000000 -0500
|
|
@@ -48,6 +48,9 @@
|
|
unsigned long uid = geteuid();
|
|
#endif
|
|
|
|
+ if (piece == NULL)
|
|
+ return ENOMEM;
|
|
+
|
|
rcache = (krb5_rcache) malloc(sizeof(*rcache));
|
|
if (!rcache)
|
|
return ENOMEM;
|