diff options
author | Michal Zidek <mzidek@redhat.com> | 2013-08-05 20:59:33 +0200 |
---|---|---|
committer | Jakub Hrozek <jhrozek@redhat.com> | 2013-08-11 22:21:17 +0200 |
commit | b5d6a9dc1ad63e8567de4c2805fc5baad54dc456 (patch) | |
tree | 4ee3d0db415ba34b1817570d9a9008e3e3e0e8fc /src/responder/nss/nsssrv_mmap_cache.h | |
parent | 29b9dbc96370b85e460156e528cb2542c160cfd3 (diff) | |
download | sssd-b5d6a9dc1ad63e8567de4c2805fc5baad54dc456.tar.gz sssd-b5d6a9dc1ad63e8567de4c2805fc5baad54dc456.tar.xz sssd-b5d6a9dc1ad63e8567de4c2805fc5baad54dc456.zip |
mmap_cache: Check if slot and name_ptr are not invalid.sssd-1.9.2-118.el6
This patch prevents jumping outside of allocated memory in
case of corrupted slot or name_ptr values. It is not proper
solution, just hotfix until we find out what is the root cause
of ticket https://fedorahosted.org/sssd/ticket/2018
Diffstat (limited to 'src/responder/nss/nsssrv_mmap_cache.h')
-rw-r--r-- | src/responder/nss/nsssrv_mmap_cache.h | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/src/responder/nss/nsssrv_mmap_cache.h b/src/responder/nss/nsssrv_mmap_cache.h index 25cec40cc..fdeaa0912 100644 --- a/src/responder/nss/nsssrv_mmap_cache.h +++ b/src/responder/nss/nsssrv_mmap_cache.h @@ -63,4 +63,6 @@ errno_t sss_mmap_cache_gr_invalidate_gid(struct sss_mc_ctx *mcc, gid_t gid); errno_t sss_mmap_cache_reinit(TALLOC_CTX *mem_ctx, size_t n_elem, time_t timeout, struct sss_mc_ctx **mc_ctx); +void sss_mmap_cache_reset(struct sss_mc_ctx *mc_ctx); + #endif /* _NSSSRV_MMAP_CACHE_H_ */ |