head	1.2;
access;
symbols
	RELEASE_4_4_0:1.1;
locks; strict;
comment	@# @;


1.2
date	2002.01.16.03.17.24;	author cy;	state dead;
branches;
next	1.1;

1.1
date	2001.04.27.18.15.34;	author nectar;	state Exp;
branches;
next	;


desc
@@


1.2
log
@Update 1.2.2 -> 1.2.3
@
text
@--- appl/gssftp/ftpd/ftpcmd.y.ORIG	Wed Feb 28 16:06:45 2001
+++ appl/gssftp/ftpd/ftpcmd.y	Fri Apr 27 10:18:01 2001
@@@@ -805,11 +805,13 @@@@
 		 * This is a valid reply in some cases but not in others.
 		 */
 		if (logged_in && $1 && strncmp((char *) $1, "~", 1) == 0) {
-			*(char **)&($$) = *ftpglob((char *) $1);
-			if (globerr != NULL) {
+			char **vv;
+			vv = ftpglob((char *) $1);
+			if (vv == NULL || globerr != NULL) {
 				reply(550, globerr);
 				$$ = NULL;
-			}
+			} else
+				$$ = *vv;
 			free((char *) $1);
 		} else
 			$$ = $1;
@


1.1
log
@Security fix:
  ``Buffer overflows exist in the FTP daemon included with MIT krb5.''
  See <URL:http://web.mit.edu/kerberos/www/advisories/ftpbuf.txt> and
  <URL:http://web.mit.edu/kerberos/www/advisories/ftpbuf_122_patch.txt>.

Obtained from:  MIT Kerberos mailing list
@
text
@@

