Описание
Security update for krb5
krb5 has been updated to fix four security issues:
Additionally, these non-security issues have been fixed:
Security Issues:
Список пакетов
SUSE Linux Enterprise Desktop 11 SP3
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Server 11 SP3-TERADATA
SUSE Linux Enterprise Server for SAP Applications 11 SP3
SUSE Linux Enterprise Software Development Kit 11 SP3
Ссылки
- Link for SUSE-SU-2015:0257-1
- E-Mail link for SUSE-SU-2015:0257-1
- SUSE Security Ratings
- SUSE Bug 872912
- SUSE Bug 906557
- SUSE Bug 912002
- SUSE CVE CVE-2014-5352 page
- SUSE CVE CVE-2014-9421 page
- SUSE CVE CVE-2014-9422 page
- SUSE CVE CVE-2014-9423 page
Описание
The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via crafted GSSAPI traffic, as demonstrated by traffic to kadmind.
Затронутые продукты
Ссылки
- CVE-2014-5352
- SUSE Bug 1005509
- SUSE Bug 770172
- SUSE Bug 912002
Описание
The auth_gssapi_unwrap_data function in lib/rpc/auth_gssapi_misc.c in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly handle partial XDR deserialization, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via malformed XDR data, as demonstrated by data sent to kadmind.
Затронутые продукты
Ссылки
- CVE-2014-9421
- SUSE Bug 1005509
- SUSE Bug 770172
- SUSE Bug 912002
Описание
The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial "kadmind" substring, as demonstrated by a "ka/x" principal.
Затронутые продукты
Ссылки
- CVE-2014-9422
- SUSE Bug 1005509
- SUSE Bug 770172
- SUSE Bug 912002
Описание
The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.
Затронутые продукты
Ссылки
- CVE-2014-9423
- SUSE Bug 1005509
- SUSE Bug 912002