Bug 484268 - length validation checks needed for TPS inputs added for TPS roles
Summary: length validation checks needed for TPS inputs added for TPS roles
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Dogtag Certificate System
Classification: Retired
Component: TPS
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Ade Lee
QA Contact: Chandrasekar Kannan
URL:
Whiteboard:
Depends On:
Blocks: 443788
TreeView+ depends on / blocked
 
Reported: 2009-02-05 18:59 UTC by Ade Lee
Modified: 2015-01-04 23:36 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2009-07-22 23:32:10 UTC
Embargoed:


Attachments (Terms of Use)

Description Ade Lee 2009-02-05 18:59:11 UTC
Description of problem:


Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.
  
Actual results:


Expected results:


Additional info:

Comment 1 Ade Lee 2009-02-05 19:30:56 UTC
Fix attached in Bug 481670

Please see changes there.

Comment 2 Ade Lee 2009-02-06 05:22:26 UTC
builder@dhcp231-124 tps]$ svn ci -m "Bugzilla BZ# 481670 and others"
Sending        tps/forms/esc/cgi-bin/sow/cfg.pl
Sending        tps/lib/perl/PKI/TPS/DRMInfoPanel.pm
Sending        tps/scripts/addAgents.ldif
Sending        tps/src/engine/RA.cpp
Sending        tps/src/include/engine/RA.h
Sending        tps/src/include/tus/tus_db.h
Sending        tps/src/main/ConfigStore.cpp
Sending        tps/src/modules/tokendb/mod_tokendb.cpp
Sending        tps/src/processor/RA_Enroll_Processor.cpp
Sending        tps/src/tus/tus_db.c
Transmitting file data ..........
Committed revision 211.

[builder@dhcp231-124 tps]$ svn ci -m "Bugzilla BZ# 481670 and others"
Sending        tps/pki-tps.spec
Transmitting file data .
Committed revision 212.

Comment 3 Asha Akkiangady 2009-07-06 02:08:40 UTC
Ade,
Please provide the STR for this bug.
thanks,
Asha

Comment 4 Ade Lee 2009-07-14 04:38:15 UTC
Not sure quite how to reproduce a bug per se.

You could try to create several users with more than 256 characters in the full name.  At that point, the user name (if it is even allowed) will be truncated. 

The most important thing though is that the system should be able to function normally -- ie. check the error logs for any segmentation faults.  If no segmentation faults or  fatal errors occur, then no memory overrun has occurred.

Comment 5 Asha Akkiangady 2009-07-15 18:51:42 UTC
Verified.

Created about 40 tps users having 257 characters in the first name, error logs did not show any segmentation faults. Seeing couple of issues related to this 1) CA List Certificate UI is not shown well, it would be nice if the long string is truncated (https://bugzilla.redhat.com/show_bug.cgi?id=511939). 2) When tried to login to tps agent/admin with this user credential, SSL layer is not accepting this certificate properly (https://bugzilla.redhat.com/show_bug.cgi?id=511946) .


Note You need to log in before you can comment on or make changes to this bug.