Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2023-6699

Опубликовано: 11 нояб. 2023
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2023-6699: krb5 security and bug fix update (MODERATE)

[1.21.1-1.0.1]

  • Fixed race condition in krb5_set_password() [Orabug: 33609767]

[1.21.1-1]

  • New upstream version (1.21.1)
  • Fix double-free in KDC TGS processing (CVE-2023-39975)
  • Add support for 'pac_privsvr_enctype' KDB string attribute Resolves: rhbz#2060421

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

krb5-devel

1.21.1-1.0.1.el9

krb5-libs

1.21.1-1.0.1.el9

krb5-pkinit

1.21.1-1.0.1.el9

krb5-server

1.21.1-1.0.1.el9

krb5-server-ldap

1.21.1-1.0.1.el9

krb5-workstation

1.21.1-1.0.1.el9

libkadm5

1.21.1-1.0.1.el9

Oracle Linux x86_64

krb5-devel

1.21.1-1.0.1.el9

krb5-libs

1.21.1-1.0.1.el9

krb5-pkinit

1.21.1-1.0.1.el9

krb5-server

1.21.1-1.0.1.el9

krb5-server-ldap

1.21.1-1.0.1.el9

krb5-workstation

1.21.1-1.0.1.el9

libkadm5

1.21.1-1.0.1.el9

Связанные CVE

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 2 года назад

kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.

CVSS3: 8.8
redhat
почти 2 года назад

kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.

CVSS3: 8.8
nvd
почти 2 года назад

kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.

CVSS3: 8.8
debian
почти 2 года назад

kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a ...

CVSS3: 6.5
ubuntu
почти 2 года назад

lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.