[3175] in Kerberos-V5-bugs
krb5-kdc/919: bug in kdc/network.c
daemon@ATHENA.MIT.EDU (W. David Shambroom)
Tue Jan 30 18:13:17 2001
Resent-From: gnats@rt-11.mit.edu (GNATS Management)
Resent-To: krb5-unassigned@RT-11.MIT.EDU
Resent-Reply-To: krb5-bugs@MIT.EDU, "W. David Shambroom" <DShambroom@gte.com>
Message-Id: <3A7749C2.53EBEC5C@gte.com>
Date: Tue, 30 Jan 2001 18:09:54 -0500
From: "W. David Shambroom" <DShambroom@gte.com>
To: krb5-bugs@MIT.EDU
>Number: 919
>Category: krb5-kdc
>Synopsis: KDC fails to initialize
>Confidential: no
>Severity: critical
>Priority: high
>Responsible: krb5-unassigned
>State: open
>Class: sw-bug
>Submitter-Id: unknown
>Arrival-Date: Tue Jan 30 18:13:00 EST 2001
>Last-Modified:
>Originator: W. David Shambroom
>Organization:
Verizon Technology
>Release: krb5-1.2.1
>Environment:
System: AIX uno1 3 4 000327294C00
>Description:
krb5kdc fails to initialize, reporting:
krb5kdc: no sockets set up?
>How-To-Repeat:
Run krb5kdc.
>Fix:
Problem is in line 159 of kdc/network.c.
System can return 5 ifreq structures of size 144,32,40,144,32 bytes
respectively, corresponding to loopback link level, loopback IPv4,
loopback
IPv6, ethernet link level, and ethernet IPv4. Last 2 are not retrieved,
since
(320-144+32+40<32+40) is false.
Increasing constant (40) to a larger value (say 128) fixes.
Note that some versions of AIX have a bug that causes a buffer overflow
if
the ioctl() call is made with too small a buffer. A workaround for this
is to
increase the initial buffer size, e.g., to 1024 B.
>Audit-Trail:
>Unformatted: