[16984] in Kerberos-V5-bugs

home help back first fref pref prev next nref lref last post

[krbdev.mit.edu #9150] [Comment] libdb2 does not adequately validate

daemon@ATHENA.MIT.EDU (Greg Hudson via RT)
Mon Nov 4 18:32:35 2024

From: "Greg Hudson via RT" <rt-comment@kerborg-prod-app-1.mit.edu>
In-Reply-To: <CAF0FeX1ALfMAosTLA8a-rDc9gijzQawAF5AaOMADcDWPE4D2WQ@mail.gmail.com>
Message-ID: <rt-4.4.3-2-2522926-1730763143-534.9150-8-0@kerborg-prod-app-1.mit.edu>
To: "AdminCc of krbdev.mit.edu Ticket #9150":;
Date: Mon, 04 Nov 2024 18:32:23 -0500
MIME-Version: 1.0
Reply-To: rt-comment@kerborg-prod-app-1.mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu


http://kerborg-prod-app-1.mit.edu/rt/Ticket/Display.html?id=9150
This is a comment.  It is not sent to the Requestor(s):

This came in as a series of apparent static analysis reports.  A second report
noted a second tainting issue in the same function.  Everything used in the
bpages calculation at line 169 comes from the database file without
validation, which means the memset() at line 174 could exceed the bounds of
hashp->mapp for a variety of reasons.

This isn't a security issue because KDB metadata is trusted input, and this
isn't likely to manifest as a bug because the hash database type isn't used by
default (btree is).  But since this code appears very lax about validating
metadata loaded from the DB file, there could be similar issues in the btree
code or elsewhere in the hash code.

_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs

home help back first fref pref prev next nref lref last post