[17087] in Kerberos-V5-bugs
[krbdev.mit.edu #9200] git commit
daemon@ATHENA.MIT.EDU (Greg Hudson via RT)
Mon Mar 23 13:13:57 2026
From: "Greg Hudson via RT" <rt-comment@krbdev.mit.edu>
In-Reply-To:
Message-ID: <rt-4.4.3-2-924731-1774286030-469.9200-4-0@mit.edu>
To: "AdminCc of krbdev.mit.edu Ticket #9200":;
Date: Mon, 23 Mar 2026 13:13:51 -0400
MIME-Version: 1.0
Reply-To: rt-comment@krbdev.mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu
Mon Mar 23 13:13:50 2026: Request 9200 was acted upon.
Transaction: Ticket created by ghudson@mit.edu
Queue: krb5
Subject: git commit
Owner: ghudson@mit.edu
Requestors:
Status: new
Ticket <URL: https://krbdev.mit.edu/rt/Ticket/Display.html?id=9200 >
Cap decoding GeneralTime when time_t is 32-bit
In k5_asn1_decode_generaltime(), on platforms with 32-bit time_t only,
yield the maximum possible timestamp value when the result would
exceed it.
This change addresses Windows clients and KDCs using timestamps in the
year 2100 to represent "never". While it is not in general safe to
return the wrong value from an ASN.1 decoding function instead of an
error, 32-bit platforms are increasingly rare, and there no negative
ramifications are known at this time.
[ghudson@mit.edu: added comment; rewrote commit message]
https://github.com/krb5/krb5/commit/7e0e602875075fe541d3ffa65acca2e3b94adcd0
Author: Michael Osipov <michael.osipov@innomotics.com>
Committer: Greg Hudson <ghudson@mit.edu>
Commit: 7e0e602875075fe541d3ffa65acca2e3b94adcd0
Branch: master
src/lib/krb5/asn.1/asn1_encode.c | 15 +++++++++++++++
1 file changed, 15 insertions(+)
_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs