[17097] in Kerberos-V5-bugs

home help back first fref pref prev next nref lref last post

[krbdev.mit.edu #9201] git commit

daemon@ATHENA.MIT.EDU (Greg Hudson via RT)
Thu Apr 23 18:25:50 2026

From: "Greg Hudson via RT" <rt@krbdev.mit.edu>
In-Reply-To: 
Message-ID: <rt-4.4.3-2-4084751-1776983144-1048.9201-5-0@mit.edu>
To: "AdminCc of krbdev.mit.edu Ticket #9201":;
Date: Thu, 23 Apr 2026 18:25:44 -0400
MIME-Version: 1.0
Reply-To: rt@krbdev.mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu


<URL: https://krbdev.mit.edu/rt/Ticket/Display.html?id=9201 >


Prevent read overrun in svc_auth_gssapi

In gssrpc__svcauth_gssapi(), check that the client handle length is at
least 4, to prevent an out-of-bounds read by get_client().

[ghudson@mit.edu: combined length<4 check with length==0 check;
rewrote commit message]

(cherry picked from commit f8a0bee0a54ba0d96804631a3261ecd233051863)

https://github.com/krb5/krb5/commit/9d9487956766f74485a32de6ad0f628f4251a6f0
Author: Rahul Hoysala <rahulhoysala07@gmail.com>
Committer: Greg Hudson <ghudson@mit.edu>
Commit: 9d9487956766f74485a32de6ad0f628f4251a6f0
Branch: krb5-1.22
 src/lib/rpc/svc_auth_gssapi.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs

home help back first fref pref prev next nref lref last post