MITKRB5-SA-2007-005: kadmind vulnerable to buffer overflow
    Mike Friedman 
    mikef at ack.berkeley.edu
       
    Wed Jun 27 16:27:11 EDT 2007
    
    
  
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Wed, 27 Jun 2007 at 13:28 (-0500), Lee Hinman wrote:
> Peter,
>
> Just a little suggestion on your patch.  Calling error_message 
> (ret.code) when ret.code == 0 may cause your output to be something like 
> "Unknown error: 0".  It will depend on what your libc does when you call 
> sterror(0).  Previously it would print out "success".  The change below 
> restores that behavior.
Lee,
I guess you're referring to Russ Allbery's patch.
Maybe I'm missing something, but I don't see your proposed change; what 
you included in your email seems to be just Russ's patch as-is.
Are you saying that 'error_message(ret.code)' should be replaced with 
something else, because the test for (ret.code == 0) is not always 
reliable as an indicator of success?  If so, what should be used instead?
Thanks in advance for clarifying.
Mike
_________________________________________________________________________
Mike Friedman                        Information Services & Technology
mikef at ack.Berkeley.EDU               2484 Shattuck Avenue
1-510-642-1410                       University of California at Berkeley
http://socrates.berkeley.edu/~mikef  http://ist.berkeley.edu
_________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8
iQA/AwUBRoLIIq0bf1iNr4mCEQKsDgCffHAeBQhhGJoDKfhGexCQsqsHeHAAn3dr
8yhnbX9wrRUnbiV5Lg3YPF4u
=pDP/
-----END PGP SIGNATURE-----
    
    
More information about the krbdev
mailing list