diff options
| author | neilbrown <neilbrown> | 2006-04-10 09:57:17 +0000 |
|---|---|---|
| committer | neilbrown <neilbrown> | 2006-04-10 09:57:17 +0000 |
| commit | 660809fe7e597520d17deab9225f1b371c08d65c (patch) | |
| tree | b0da1b809f0f3ca6fac54b662486440998f9cea3 /ChangeLog | |
| parent | aa2d7a1e352a6c2190452ebc3c638b66a2cf6f9b (diff) | |
2006-04-10 NeilBrown <neilb@suse.de>
Various paranoia checks:
gssd_proc.c: pass max_field sizes to sscanf to avoid buffer
overflow
svcgssd_proc.c: range_check name.length, to ensure name.length+1
doesn't wrap
idmapd.c(nfsdcb): make sure at least one byte is read before
zeroing the last byte that was read, otherwise memory corruption
is possible.
Found by SuSE security audit.
Diffstat (limited to 'ChangeLog')
| -rw-r--r-- | ChangeLog | 12 |
1 files changed, 12 insertions, 0 deletions
@@ -1,3 +1,15 @@ +2006-04-10 NeilBrown <neilb@suse.de> + Various paranoia checks: + gssd_proc.c: pass max_field sizes to sscanf to avoid buffer + overflow + svcgssd_proc.c: range_check name.length, to ensure name.length+1 + doesn't wrap + idmapd.c(nfsdcb): make sure at least one byte is read before + zeroing the last byte that was read, otherwise memory corruption + is possible. + + Found by SuSE security audit. + 2006-04-10 "Kevin Coffman" <kwc@citi.umich.edu> Check for sufficient version of librpcsecgss and libgssapi in configure.in |
