[17099] in Kerberos-V5-bugs
[krbdev.mit.edu #9206] git commit
daemon@ATHENA.MIT.EDU (Greg Hudson via RT)
Thu Apr 23 18:26:02 2026
From: "Greg Hudson via RT" <rt@krbdev.mit.edu>
In-Reply-To:
Message-ID: <rt-4.4.3-2-4085012-1776983157-411.9206-5-0@mit.edu>
To: "AdminCc of krbdev.mit.edu Ticket #9206":;
Date: Thu, 23 Apr 2026 18:25:57 -0400
MIME-Version: 1.0
Reply-To: rt@krbdev.mit.edu
Content-Type: text/plain; charset="utf-8"
Errors-To: krb5-bugs-bounces@mit.edu
Content-Transfer-Encoding: 8bit
<URL: https://krbdev.mit.edu/rt/Ticket/Display.html?id=9206 >
Prevent read overrun in libkdb_ldap
In berval2tl_data(), reject inputs of length less than 2 to prevent an
integer underflow and subsequent read overrun. (The security impact
is negligible as the attacker would have to control the KDB LDAP
server.)
[ghudson@mit.edu: wrote commit message]
(cherry picked from commit 2a5fd83d4436583f2ddc0e193269a4d800ee45c4)
https://github.com/krb5/krb5/commit/974a8875767a2f375669f84b176c7d98a7c85a20
Author: Sebastián Alba <sebasjosue84@gmail.com>
Committer: Greg Hudson <ghudson@mit.edu>
Commit: 974a8875767a2f375669f84b176c7d98a7c85a20
Branch: krb5-1.22
src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c | 3 +++
1 file changed, 3 insertions(+)
_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs