The following commit has been merged in the openafs-stable-1_6_x branch:
commit 1174e0a6adcc4cfe7719e7090d75b4eda855998d
Author: Anders Kaseorg <[email protected]>
Date:   Sun May 4 05:30:25 2014 -0400

    Fix buffer length validation in ktc_GetToken and knfs
    
    The signed int tktLen is checked against a maximum size, then passed
    as the unsigned size_t argument to memcpy.  So we need to make sure it
    isn’t negative.
    
    This doesn’t appear to be exploitable: tktLen comes from the kernel,
    which should have previously validated the length within the SETTOK
    pioctl.
    
    This bug was found with STACK <http://css.csail.mit.edu/stack/>.
    
    Signed-off-by: Anders Kaseorg <[email protected]>
    Reviewed-on: http://gerrit.openafs.org/11109
    Reviewed-by: Chas Williams - CONTRACTOR <[email protected]>
    Tested-by: BuildBot <[email protected]>
    Reviewed-by: Jeffrey Altman <[email protected]>
    (cherry picked from commit 9c10c202f1f2e516dde8b70c3a3b69a73d163070)
    
    Change-Id: Id8dacdc00fd686d4f2ff234ffd6c8f5346d9e7b0
    Reviewed-on: http://gerrit.openafs.org/11112
    Reviewed-by: Perry Ruiter <[email protected]>
    Reviewed-by: Chas Williams - CONTRACTOR <[email protected]>
    Tested-by: BuildBot <[email protected]>
    Reviewed-by: Anders Kaseorg <[email protected]>
    Reviewed-by: Stephan Wiesand <[email protected]>

 src/auth/ktc.c   |    2 +-
 src/kauth/knfs.c |    2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

-- 
OpenAFS Master Repository
_______________________________________________
OpenAFS-cvs mailing list
[email protected]
https://lists.openafs.org/mailman/listinfo/openafs-cvs

Reply via email to