[17099] in Kerberos-V5-bugs

home help back first fref pref prev next nref lref last post

[krbdev.mit.edu #9206] git commit

daemon@ATHENA.MIT.EDU (Greg Hudson via RT)
Thu Apr 23 18:26:02 2026

From: "Greg Hudson via RT" <rt@krbdev.mit.edu>
In-Reply-To: 
Message-ID: <rt-4.4.3-2-4085012-1776983157-411.9206-5-0@mit.edu>
To: "AdminCc of krbdev.mit.edu Ticket #9206":;
Date: Thu, 23 Apr 2026 18:25:57 -0400
MIME-Version: 1.0
Reply-To: rt@krbdev.mit.edu
Content-Type: text/plain; charset="utf-8"
Errors-To: krb5-bugs-bounces@mit.edu
Content-Transfer-Encoding: 8bit


<URL: https://krbdev.mit.edu/rt/Ticket/Display.html?id=9206 >


Prevent read overrun in libkdb_ldap

In berval2tl_data(), reject inputs of length less than 2 to prevent an
integer underflow and subsequent read overrun.  (The security impact
is negligible as the attacker would have to control the KDB LDAP
server.)

[ghudson@mit.edu: wrote commit message]

(cherry picked from commit 2a5fd83d4436583f2ddc0e193269a4d800ee45c4)

https://github.com/krb5/krb5/commit/974a8875767a2f375669f84b176c7d98a7c85a20
Author: Sebastián Alba <sebasjosue84@gmail.com>
Committer: Greg Hudson <ghudson@mit.edu>
Commit: 974a8875767a2f375669f84b176c7d98a7c85a20
Branch: krb5-1.22
 src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c | 3 +++
 1 file changed, 3 insertions(+)

_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs


home help back first fref pref prev next nref lref last post