[30157] in CVS-changelog-for-Kerberos-V5

home help back first fref pref prev next nref lref last post

krb5 commit: Check for zero argc in ksu

daemon@ATHENA.MIT.EDU (Greg Hudson)
Tue Apr 24 16:10:34 2018

Date: Tue, 24 Apr 2018 16:10:25 -0400
From: Greg Hudson <ghudson@mit.edu>
Message-Id: <201804242010.w3OKAPW3032612@drugstore.mit.edu>
To: cvs-krb5@mit.edu
Reply-To: krbdev@mit.edu
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: cvs-krb5-bounces@mit.edu

https://github.com/krb5/krb5/commit/c5b0a998d6349f8c90821a347db5666aed0e50eb
commit c5b0a998d6349f8c90821a347db5666aed0e50eb
Author: Greg Hudson <ghudson@mit.edu>
Date:   Tue Apr 24 14:31:35 2018 -0400

    Check for zero argc in ksu
    
    Most programs in the tree will perform a null dereference when argc is
    zero, but as a setuid program ksu should be extra careful about memory
    errors, even if this one is harmless.  Check and exit with status 1
    immediately.
    
    ticket: 8661

 src/clients/ksu/main.c |    2 ++
 1 files changed, 2 insertions(+), 0 deletions(-)

diff --git a/src/clients/ksu/main.c b/src/clients/ksu/main.c
index 7ff676c..5e79ef5 100644
--- a/src/clients/ksu/main.c
+++ b/src/clients/ksu/main.c
@@ -138,6 +138,8 @@ main (argc, argv)
         exit(1);
     }
 
+    if (argc == 0)
+        exit(1);
     if (strrchr(argv[0], '/'))
         argv[0] = strrchr(argv[0], '/')+1;
     prog_name = argv[0];
_______________________________________________
cvs-krb5 mailing list
cvs-krb5@mit.edu
https://mailman.mit.edu/mailman/listinfo/cvs-krb5

home help back first fref pref prev next nref lref last post