]> git.ipfire.org Git - thirdparty/krb5.git/commit
Improve checking of decoded DB2 principal values
authorGreg Hudson <ghudson@mit.edu>
Tue, 23 Aug 2016 17:41:00 +0000 (13:41 -0400)
committerTom Yu <tlyu@mit.edu>
Fri, 2 Sep 2016 18:49:39 +0000 (14:49 -0400)
commitc0ecbfbac487fc532487f084332739edd91af76d
tree3500e30a9d80775e283948106988b7c850425b28
parent5a95d589db802c7fb3a2d69c8f987d8c4cee0657
Improve checking of decoded DB2 principal values

In krb5_decode_princ_entry(), verify the length of the principal name
before calling krb5_parse_name() or strlen(), to avoid a possible
buffer read overrun.  Check all length fields for negative values.
Avoid performing arithmetic as part of bounds checks.  If the value of
key_data_ver is unexpected, return KRB5_KDB_BAD_VERSION instead of
aborting.

(cherry picked from commit e3d9f03a658e247dbb43cb345aa93a28782fd995)

ticket: 8481
version_fixed: 1.14.4
src/plugins/kdb/db2/kdb_xdr.c