aboutsummaryrefslogtreecommitdiff
path: root/security/sssd/files/patch-src__providers__ldap__ldap_child.c
diff options
context:
space:
mode:
authorRene Ladan <rene@FreeBSD.org>2020-12-12 15:09:15 +0000
committerRene Ladan <rene@FreeBSD.org>2020-12-12 15:09:15 +0000
commit6592a822122a3d2bf252ccd85dd40b85b09dde59 (patch)
tree2b93a21c9e067c02f1a583dbc6d8157ffaea1a57 /security/sssd/files/patch-src__providers__ldap__ldap_child.c
parent693a9581667ca0ab414315d4f29d67c490c480c2 (diff)
downloadports-6592a822122a3d2bf252ccd85dd40b85b09dde59.tar.gz
ports-6592a822122a3d2bf252ccd85dd40b85b09dde59.zip
MFH: r555585 r557829
security/sssd: update to 1.16.5 This fixes several security vulnerabilities and unexpires the port because it moves to Python 3. PR: 241347 Submitted by: lukas.slebodnik@intrak.sk (initial patch) Security: CVE-2018-16838 Security: CVE-2019-3811 security/sssd: fix SMB option - use Samba 4.12 instead of the removed Samba 4.10 - use ldb 2.1 instead of ldb 2.0 While here, recognize Kerberos 1.18 PR: 250864 Submitted by: joerg (patch by Richard Frewin) Approved by: maintainer timeout (14 days)
Notes
Notes: svn path=/branches/2020Q4/; revision=557830
Diffstat (limited to 'security/sssd/files/patch-src__providers__ldap__ldap_child.c')
-rw-r--r--security/sssd/files/patch-src__providers__ldap__ldap_child.c22
1 files changed, 22 insertions, 0 deletions
diff --git a/security/sssd/files/patch-src__providers__ldap__ldap_child.c b/security/sssd/files/patch-src__providers__ldap__ldap_child.c
new file mode 100644
index 000000000000..745687d00267
--- /dev/null
+++ b/security/sssd/files/patch-src__providers__ldap__ldap_child.c
@@ -0,0 +1,22 @@
+diff --git src/providers/ldap/ldap_child.c src/providers/ldap/ldap_child.c
+index 368bb91e1..1bc86ecb5 100644
+--- src/providers/ldap/ldap_child.c
++++ src/providers/ldap/ldap_child.c
+@@ -324,14 +324,14 @@ static krb5_error_code ldap_child_get_tgt_sync(TALLOC_CTX *memctx,
+ full_princ = talloc_strdup(tmp_ctx, princ_str);
+ }
+ } else {
+- char hostname[HOST_NAME_MAX + 1];
++ char hostname[_POSIX_HOST_NAME_MAX + 1];
+
+- ret = gethostname(hostname, sizeof(hostname));
++ ret = gethostname(hostname, _POSIX_HOST_NAME_MAX);
+ if (ret == -1) {
+ krberr = KRB5KRB_ERR_GENERIC;
+ goto done;
+ }
+- hostname[HOST_NAME_MAX] = '\0';
++ hostname[_POSIX_HOST_NAME_MAX] = '\0';
+
+ DEBUG(SSSDBG_TRACE_LIBS, "got hostname: [%s]\n", hostname);
+