MITKRB5-SA-2007-005: kadmind vulnerable to buffer overflow

Mike Friedman mikef at ack.berkeley.edu
Wed Jun 27 16:27:11 EDT 2007


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Wed, 27 Jun 2007 at 13:28 (-0500), Lee Hinman wrote:

> Peter,
>
> Just a little suggestion on your patch.  Calling error_message 
> (ret.code) when ret.code == 0 may cause your output to be something like 
> "Unknown error: 0".  It will depend on what your libc does when you call 
> sterror(0).  Previously it would print out "success".  The change below 
> restores that behavior.

Lee,

I guess you're referring to Russ Allbery's patch.

Maybe I'm missing something, but I don't see your proposed change; what 
you included in your email seems to be just Russ's patch as-is.

Are you saying that 'error_message(ret.code)' should be replaced with 
something else, because the test for (ret.code == 0) is not always 
reliable as an indicator of success?  If so, what should be used instead?

Thanks in advance for clarifying.

Mike

_________________________________________________________________________
Mike Friedman                        Information Services & Technology
mikef at ack.Berkeley.EDU               2484 Shattuck Avenue
1-510-642-1410                       University of California at Berkeley
http://socrates.berkeley.edu/~mikef  http://ist.berkeley.edu
_________________________________________________________________________

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8

iQA/AwUBRoLIIq0bf1iNr4mCEQKsDgCffHAeBQhhGJoDKfhGexCQsqsHeHAAn3dr
8yhnbX9wrRUnbiV5Lg3YPF4u
=pDP/
-----END PGP SIGNATURE-----



More information about the krbdev mailing list