From: Tom Yu Date: Mon, 14 Jul 2008 22:12:21 +0000 (+0000) Subject: pull up r20296 from trunk X-Git-Tag: kfw-3.2.3-alpha1~40 X-Git-Url: http://git.tremily.us/?a=commitdiff_plain;h=23724ef42ee46ffeb35d2603f7474ca6e7d7b8ee;p=krb5.git pull up r20296 from trunk r20296@cathode-dark-space: raeburn | 2008-03-28 21:09:00 -0400 ticket: new subject: Coverity CID 101: Fix minor bounds check error. target_version: 1.6.4 tags: pullup Coverity CID 101: Fix minor bounds check error. ticket: 5933 version_fixed: 1.6.4 git-svn-id: svn://anonsvn.mit.edu/krb5/branches/krb5-1-6@20520 dc483132-0cff-0310-8789-dd5450dbe970 --- diff --git a/src/kdc/kerberos_v4.c b/src/kdc/kerberos_v4.c index 2c4b56705..6957c0178 100644 --- a/src/kdc/kerberos_v4.c +++ b/src/kdc/kerberos_v4.c @@ -811,7 +811,7 @@ kerberos_v4(struct sockaddr_in *client, KTEXT pkt) auth->mbz = 0; /* pkt->mbz already zeroed */ auth->length = 4 + strlen((char *)pkt->dat + 3); - if (auth->length + 1 > MAX_KTXT_LEN) { + if (auth->length + 1 >= MAX_KTXT_LEN) { lt = klog(L_KRB_PERR, "APPL request with realm length too long from %s", inet_ntoa(client_host));