[17087] in Kerberos-V5-bugs

home help back first fref pref prev next nref lref last post

[krbdev.mit.edu #9200] git commit

daemon@ATHENA.MIT.EDU (Greg Hudson via RT)
Mon Mar 23 13:13:57 2026

From: "Greg Hudson via RT" <rt-comment@krbdev.mit.edu>
In-Reply-To: 
Message-ID: <rt-4.4.3-2-924731-1774286030-469.9200-4-0@mit.edu>
To: "AdminCc of krbdev.mit.edu Ticket #9200":;
Date: Mon, 23 Mar 2026 13:13:51 -0400
MIME-Version: 1.0
Reply-To: rt-comment@krbdev.mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu


Mon Mar 23 13:13:50 2026: Request 9200 was acted upon.
 Transaction: Ticket created by ghudson@mit.edu
       Queue: krb5
     Subject: git commit
       Owner: ghudson@mit.edu
  Requestors: 
      Status: new
 Ticket <URL: https://krbdev.mit.edu/rt/Ticket/Display.html?id=9200 >



Cap decoding GeneralTime when time_t is 32-bit

In k5_asn1_decode_generaltime(), on platforms with 32-bit time_t only,
yield the maximum possible timestamp value when the result would
exceed it.

This change addresses Windows clients and KDCs using timestamps in the
year 2100 to represent "never".  While it is not in general safe to
return the wrong value from an ASN.1 decoding function instead of an
error, 32-bit platforms are increasingly rare, and there no negative
ramifications are known at this time.

[ghudson@mit.edu: added comment; rewrote commit message]

https://github.com/krb5/krb5/commit/7e0e602875075fe541d3ffa65acca2e3b94adcd0
Author: Michael Osipov <michael.osipov@innomotics.com>
Committer: Greg Hudson <ghudson@mit.edu>
Commit: 7e0e602875075fe541d3ffa65acca2e3b94adcd0
Branch: master
 src/lib/krb5/asn.1/asn1_encode.c | 15 +++++++++++++++
 1 file changed, 15 insertions(+)

_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs

home help back first fref pref prev next nref lref last post