Revision Date: | 2015-01-21 | Version: | 1 |
Title: | Security update for krb5 (Important) |
Description: |
MIT kerberos krb5 was updated to fix several security issues and bugs.
Security issues fixed: CVE-2014-5351: The kadm5_randkey_principal_3 function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) sent old keys in a response to a -randkey -keepold request, which allowed remote authenticated users to forge tickets by leveraging administrative access.
CVE-2014-5352: In the MIT krb5 libgssapi_krb5 library, after gss_process_context_token() is used to process a valid context deletion token, the caller was left with a security context handle containing a dangling pointer. Further uses of this handle would have resulted in use-after-free and double-free memory access violations. libgssrpc server applications such as kadmind were vulnerable as they can be instructed to call gss_process_context_token().
CVE-2014-9421: If the MIT krb5 kadmind daemon receives invalid XDR data from an authenticated user, it may have performed use-after-free and double-free memory access violations while cleaning up the partial deserialization results. Other libgssrpc server applications might also been vulnerable if they contain insufficiently defensive XDR functions.
CVE-2014-9422: The MIT krb5 kadmind daemon incorrectly accepted authentications to two-component server principals whose first component is a left substring of 'kadmin' or whose realm is a left prefix of the default realm.
CVE-2014-9423: libgssrpc applications including kadmind output four or eight bytes of uninitialized memory to the network as part of an unused 'handle' field in replies to clients.
Bugs fixed: - Work around replay cache creation race; (bnc#898439).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 897874 898439 912002 CVE-2014-5351 CVE-2014-5352 CVE-2014-9421 CVE-2014-9422 CVE-2014-9423 SUSE-SU-2015:0290-2
|
Platform(s): | SUSE Linux Enterprise Desktop 12
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 is installed AND Package Information
krb5-1.12.1-9.1 is installed
OR krb5-32bit-1.12.1-9.1 is installed
OR krb5-client-1.12.1-9.1 is installed
|