[17027] in Kerberos-V5-bugs
[krbdev.mit.edu #9175] git commit
daemon@ATHENA.MIT.EDU (Greg Hudson via RT)
Wed Jul 16 12:22:29 2025
From: "Greg Hudson via RT" <rt@krbdev.mit.edu>
In-Reply-To:
Message-ID: <rt-4.4.3-2-2664514-1752682941-1393.9175-5-0@mit.edu>
To: "AdminCc of krbdev.mit.edu Ticket #9175":;
Date: Wed, 16 Jul 2025 12:22:21 -0400
MIME-Version: 1.0
Reply-To: rt@krbdev.mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu
<URL: https://krbdev.mit.edu/rt/Ticket/Display.html?id=9175 >
Avoid undefined memcpy in asn1_encode.c
The C standard specifies that passing null pointers to most standard
library functions results in undefined behavior (C99 7.1.4). This
applies to memcpy() even when the length is 0. insert_bytes() in
asn1_encode.c may be called with a null pointer from an empty
krb5_data or other counted value in a structure to be encoded. Do not
call memcpy() in this case.
Reported by Kirill Furman.
https://github.com/krb5/krb5/commit/4b4a720cacec8827c9b3f65b4920ac1b0075f38e
Author: Greg Hudson <ghudson@mit.edu>
Commit: 4b4a720cacec8827c9b3f65b4920ac1b0075f38e
Branch: master
src/lib/krb5/asn.1/asn1_encode.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs