summaryrefslogtreecommitdiffstats
path: root/sys/isa/syscons.h
diff options
context:
space:
mode:
authorwpaul <wpaul@FreeBSD.org>1996-09-30 22:27:00 +0000
committerwpaul <wpaul@FreeBSD.org>1996-09-30 22:27:00 +0000
commitc8132b2e31d6c5dc8067b94e551d8618819697ff (patch)
treec9c4f461f68c7e6cecce810e8a73c28642451623 /sys/isa/syscons.h
parent7706e782e683d8d989a649d386f2b5c12ccd2768 (diff)
downloadFreeBSD-src-c8132b2e31d6c5dc8067b94e551d8618819697ff.zip
FreeBSD-src-c8132b2e31d6c5dc8067b94e551d8618819697ff.tar.gz
Close a potential security hole: if yp_access() is passed a map name,
have it check to see that it doesn't contain any '/' characters. This prevents possible silliness like ypcat "../../../kernel". We already test the domain name for this in yp_validdomain(), and ypserv itself tests the map name in yp_open_db(), but it doesn't hurt to be paranoid and test for it in the generic access routine too. rpc.ypxfrd does not test the map name for slashes, but it does call yp_access() with the map name, so this removes a potential vulnerability from there. Also make the tests for IPPORT_RESERVED a little more selective: make sure it trips when map == master.passwd.*, prog == YPPROC and proc == YPPROC_XFR, and prog == YPXFRD_FREEBSD_PROG and proc == YPXFRD_GETMAP. Also use IPPORT_RESERVED instead of hard-coded value.
Diffstat (limited to 'sys/isa/syscons.h')
0 files changed, 0 insertions, 0 deletions
OpenPOWER on IntegriCloud