diff options
author | Mike Frysinger <vapier@gentoo.org> | 2009-01-28 21:11:28 +0000 |
---|---|---|
committer | Mike Frysinger <vapier@gentoo.org> | 2009-01-28 21:11:28 +0000 |
commit | 6ad72210f8454e88635e8513dcaafc81baff7d3f (patch) | |
tree | 4abd61d70337906fc167e2787fb0521fdb6c68f2 /net-libs/libtirpc/files | |
parent | Version bump. (diff) | |
download | gentoo-2-6ad72210f8454e88635e8513dcaafc81baff7d3f.tar.gz gentoo-2-6ad72210f8454e88635e8513dcaafc81baff7d3f.tar.bz2 gentoo-2-6ad72210f8454e88635e8513dcaafc81baff7d3f.zip |
old
(Portage version: 2.2_rc23/cvs/Linux x86_64)
Diffstat (limited to 'net-libs/libtirpc/files')
-rw-r--r-- | net-libs/libtirpc/files/libtirpc-0.1.7-CVE-2007-3999.patch | 35 |
1 files changed, 0 insertions, 35 deletions
diff --git a/net-libs/libtirpc/files/libtirpc-0.1.7-CVE-2007-3999.patch b/net-libs/libtirpc/files/libtirpc-0.1.7-CVE-2007-3999.patch deleted file mode 100644 index b9a7aa4f21f1..000000000000 --- a/net-libs/libtirpc/files/libtirpc-0.1.7-CVE-2007-3999.patch +++ /dev/null @@ -1,35 +0,0 @@ -commit 3cf1a3ce1a409e647f9b8ca4497c26e6d066f293 -Author: Steve Dickson <steved@redhat.com> -Date: Thu Jan 24 15:01:22 2008 -0500 - - Protect from buffer overflow in the GSS code. - - Signed-off-by: Steve Dickson <steved@redhat.com> - -diff -up libtirpc-0.1.7/src/svc_auth_gss.c.orig libtirpc-0.1.7/src/svc_auth_gss.c ---- libtirpc-0.1.7/src/svc_auth_gss.c.orig 2008-01-24 14:41:21.000000000 -0500 -+++ libtirpc-0.1.7/src/svc_auth_gss.c 2008-01-24 14:59:31.000000000 -0500 -@@ -294,6 +294,15 @@ svcauth_gss_validate(struct svc_rpc_gss_ - memset(rpchdr, 0, sizeof(rpchdr)); - - /* XXX - Reconstruct RPC header for signing (from xdr_callmsg). */ -+ oa = &msg->rm_call.cb_cred; -+ if (oa->oa_length > MAX_AUTH_BYTES) -+ return (FALSE); -+ -+ /* 8 XDR units from the IXDR macro calls. */ -+ if (sizeof(rpchdr) < (8 * BYTES_PER_XDR_UNIT + -+ RNDUP(oa->oa_length))) -+ return (FALSE); -+ - buf = (int32_t *)rpchdr; - IXDR_PUT_LONG(buf, msg->rm_xid); - IXDR_PUT_ENUM(buf, msg->rm_direction); -@@ -301,7 +310,6 @@ svcauth_gss_validate(struct svc_rpc_gss_ - IXDR_PUT_LONG(buf, msg->rm_call.cb_prog); - IXDR_PUT_LONG(buf, msg->rm_call.cb_vers); - IXDR_PUT_LONG(buf, msg->rm_call.cb_proc); -- oa = &msg->rm_call.cb_cred; - IXDR_PUT_ENUM(buf, oa->oa_flavor); - IXDR_PUT_LONG(buf, oa->oa_length); - if (oa->oa_length) { |