Updated krb5 packages fix security vulnerability
Publication date: 05 Feb 2016Type: security
Affected Mageia releases : 5
CVE: CVE-2015-8629 , CVE-2015-8630 , CVE-2015-8631
Description
In all versions of MIT krb5, an authenticated attacker can cause kadmind to read beyond the end of allocated memory by sending a string without a terminating zero byte. Information leakage may be possible for an attacker with permission to modify the database (CVE-2015-8629). In MIT krb5 1.12 and later, an authenticated attacker with permission to modify a principal entry can cause kadmind to dereference a null pointer by supplying a null policy value but including KADM5_POLICY in the mask (CVE-2015-8630). In all versions of MIT krb5, an authenticated attacker can cause kadmind to leak memory by supplying a null principal name in a request which uses one. Repeating these requests will eventually cause kadmind to exhaust all available memory (CVE-2015-8631).
References
- https://bugs.mageia.org/show_bug.cgi?id=17642
- https://lists.fedoraproject.org/pipermail/package-announce/2016-January/176451.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631
SRPMS
5/core
- krb5-1.12.2-8.3.mga5