From: Howard Chu Date: Tue, 6 Jan 2026 20:52:25 +0000 (+0000) Subject: ITS#10421 mdb_load: check for malicious input X-Git-Tag: LMDB_0.9.34~5 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=46b33d2b45075b5b538e92491751d8a6279b26f9;p=thirdparty%2Fopenldap.git ITS#10421 mdb_load: check for malicious input --- diff --git a/libraries/liblmdb/mdb_load.c b/libraries/liblmdb/mdb_load.c index d266b4f6e1..4e9dbcbabf 100644 --- a/libraries/liblmdb/mdb_load.c +++ b/libraries/liblmdb/mdb_load.c @@ -208,6 +208,12 @@ badend: c1 = buf->mv_data; len = strlen((char *)c1); + if (!len) { + /* This can only happen with an intentionally invalid input + * with a NUL byte after the leading SPACE + */ + goto badend; + } l2 = len; /* Is buffer too short? */