From: | ghudson@mit.edu |
Subject: | git commit |
Improve checking of decoded DB2 principal values
In krb5_decode_princ_entry(), verify the length of the principal name
before calling krb5_parse_name() or strlen(), to avoid a possible
buffer read overrun. Check all length fields for negative values.
Avoid performing arithmetic as part of bounds checks. If the value of
key_data_ver is unexpected, return KRB5_KDB_BAD_VERSION instead of
aborting.
https://github.com/krb5/krb5/commit/e3d9f03a658e247dbb43cb345aa93a28782fd995
Author: Greg Hudson <ghudson@mit.edu>
Commit: e3d9f03a658e247dbb43cb345aa93a28782fd995
Branch: master
src/plugins/kdb/db2/kdb_xdr.c | 39 +++++++++++++++++++++++++--------------
1 files changed, 25 insertions(+), 14 deletions(-)