[3175] in Kerberos-V5-bugs

home help back first fref pref prev next nref lref last post

krb5-kdc/919: bug in kdc/network.c

daemon@ATHENA.MIT.EDU (W. David Shambroom)
Tue Jan 30 18:13:17 2001

Resent-From: gnats@rt-11.mit.edu (GNATS Management)
Resent-To: krb5-unassigned@RT-11.MIT.EDU
Resent-Reply-To: krb5-bugs@MIT.EDU, "W. David Shambroom" <DShambroom@gte.com>
Message-Id: <3A7749C2.53EBEC5C@gte.com>
Date: Tue, 30 Jan 2001 18:09:54 -0500
From: "W. David Shambroom" <DShambroom@gte.com>
To: krb5-bugs@MIT.EDU


>Number:         919
>Category:       krb5-kdc
>Synopsis:       KDC fails to initialize
>Confidential:   no
>Severity:       critical
>Priority:       high
>Responsible:    krb5-unassigned
>State:          open
>Class:          sw-bug
>Submitter-Id:   unknown
>Arrival-Date:   Tue Jan 30 18:13:00 EST 2001
>Last-Modified:
>Originator:     W. David Shambroom
>Organization:
Verizon Technology      
>Release:        krb5-1.2.1
>Environment:
        
System: AIX uno1 3 4 000327294C00


>Description:
krb5kdc fails to initialize, reporting:
krb5kdc: no sockets set up?
        
>How-To-Repeat:
Run krb5kdc.
        
>Fix:
Problem is in line 159 of kdc/network.c.
System can return 5 ifreq structures of size 144,32,40,144,32 bytes
respectively, corresponding to loopback link level, loopback IPv4,
loopback
IPv6, ethernet link level, and ethernet IPv4.  Last 2 are not retrieved,
since
(320-144+32+40<32+40) is false.
Increasing constant (40) to a larger value (say 128) fixes.
Note that some versions of AIX have a bug that causes a buffer overflow
if
the ioctl() call is made with too small a buffer.  A workaround for this
is to
increase the initial buffer size, e.g., to 1024 B.
>Audit-Trail:
>Unformatted:

home help back first fref pref prev next nref lref last post