84f939323f
obsolte patches: * krb5-1.7-nodeplibs.patch * krb5-1.9.1-ai_addrconfig.patch * krb5-1.9.1-ai_addrconfig2.patch * krb5-1.9.1-sendto_poll.patch * krb5-1.9-canonicalize-fallback.patch * krb5-1.9-paren.patch * krb5-klist_s.patch * krb5-pkinit-cms2.patch * krb5-trunk-chpw-err.patch * krb5-trunk-gss_delete_sec.patch * krb5-trunk-kadmin-oldproto.patch * krb5-1.9-MITKRB5-SA-2011-006.dif * krb5-1.9-gss_display_status-iakerb.patch * krb5-1.9.1-sendto_poll2.patch * krb5-1.9.1-sendto_poll3.patch * krb5-1.9-MITKRB5-SA-2011-007.dif - Fix an interop issue with Windows Server 2008 R2 Read-Only Domain Controllers. - Update a workaround for a glibc bug that would cause DNS PTR queries to occur even when rdns = false. - Fix a kadmind denial of service issue (null pointer dereference), which could only be triggered by an administrator with the "create" privilege. [CVE-2012-1013] - Fix access controls for KDB string attributes [CVE-2012-1012] - Make the ASN.1 encoding of key version numbers interoperate with Windows Read-Only Domain Controllers - Avoid generating spurious password expiry warnings in cases where the KDC sends an account expiry time without a password expiry time OBS-URL: https://build.opensuse.org/package/show/network/krb5?expand=0&rev=65
32 lines
1.2 KiB
Diff
32 lines
1.2 KiB
Diff
Reference docs don't define what happens if you call krb5_realm_compare() with
|
|
malformed krb5_principal structures. Define a behavior which keeps it from
|
|
crashing if applications don't check ahead of time.
|
|
|
|
Index: krb5-1.10.2/src/lib/krb5/krb/princ_comp.c
|
|
===================================================================
|
|
--- krb5-1.10.2.orig/src/lib/krb5/krb/princ_comp.c
|
|
+++ krb5-1.10.2/src/lib/krb5/krb/princ_comp.c
|
|
@@ -36,6 +36,12 @@ realm_compare_flags(krb5_context context
|
|
const krb5_data *realm1 = krb5_princ_realm(context, princ1);
|
|
const krb5_data *realm2 = krb5_princ_realm(context, princ2);
|
|
|
|
+ if ((princ1 == NULL) || (princ2 == NULL))
|
|
+ return FALSE;
|
|
+
|
|
+ if ((realm1 == NULL) || (realm2 == NULL))
|
|
+ return FALSE;
|
|
+
|
|
if (realm1->length != realm2->length)
|
|
return FALSE;
|
|
|
|
@@ -87,6 +93,9 @@ krb5_principal_compare_flags(krb5_contex
|
|
krb5_principal upn2 = NULL;
|
|
krb5_boolean ret = FALSE;
|
|
|
|
+ if ((princ1 == NULL) || (princ2 == NULL))
|
|
+ return FALSE;
|
|
+
|
|
if (flags & KRB5_PRINCIPAL_COMPARE_ENTERPRISE) {
|
|
/* Treat UPNs as if they were real principals */
|
|
if (krb5_princ_type(context, princ1) == KRB5_NT_ENTERPRISE_PRINCIPAL) {
|