Описание
Security update for krb5
This update for krb5 fixes the following security issue:
- CVE-2016-3119: An authenticated attacker with permission to modify a principal entry could have caused kadmind to dereference a null pointer by supplying an empty DB argument to the modify_principal command, if kadmind is configured to use the LDAP KDB module. (bsc#971942)
Список пакетов
SUSE Linux Enterprise Desktop 12
krb5-1.12.1-28.1
krb5-32bit-1.12.1-28.1
krb5-client-1.12.1-28.1
SUSE Linux Enterprise Desktop 12 SP1
krb5-1.12.1-28.1
krb5-32bit-1.12.1-28.1
krb5-client-1.12.1-28.1
SUSE Linux Enterprise Server 12
krb5-1.12.1-28.1
krb5-32bit-1.12.1-28.1
krb5-client-1.12.1-28.1
krb5-doc-1.12.1-28.1
krb5-plugin-kdb-ldap-1.12.1-28.1
krb5-plugin-preauth-otp-1.12.1-28.1
krb5-plugin-preauth-pkinit-1.12.1-28.1
krb5-server-1.12.1-28.1
SUSE Linux Enterprise Server 12 SP1
krb5-1.12.1-28.1
krb5-32bit-1.12.1-28.1
krb5-client-1.12.1-28.1
krb5-doc-1.12.1-28.1
krb5-plugin-kdb-ldap-1.12.1-28.1
krb5-plugin-preauth-otp-1.12.1-28.1
krb5-plugin-preauth-pkinit-1.12.1-28.1
krb5-server-1.12.1-28.1
SUSE Linux Enterprise Server for SAP Applications 12
krb5-1.12.1-28.1
krb5-32bit-1.12.1-28.1
krb5-client-1.12.1-28.1
krb5-doc-1.12.1-28.1
krb5-plugin-kdb-ldap-1.12.1-28.1
krb5-plugin-preauth-otp-1.12.1-28.1
krb5-plugin-preauth-pkinit-1.12.1-28.1
krb5-server-1.12.1-28.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1
krb5-1.12.1-28.1
krb5-32bit-1.12.1-28.1
krb5-client-1.12.1-28.1
krb5-doc-1.12.1-28.1
krb5-plugin-kdb-ldap-1.12.1-28.1
krb5-plugin-preauth-otp-1.12.1-28.1
krb5-plugin-preauth-pkinit-1.12.1-28.1
krb5-server-1.12.1-28.1
SUSE Linux Enterprise Software Development Kit 12
krb5-devel-1.12.1-28.1
SUSE Linux Enterprise Software Development Kit 12 SP1
krb5-devel-1.12.1-28.1
Ссылки
- Link for SUSE-SU-2016:0994-1
- E-Mail link for SUSE-SU-2016:0994-1
- SUSE Security Ratings
- SUSE Bug 971942
- SUSE CVE CVE-2016-3119 page
Описание
The process_db_args function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) through 1.13.4 and 1.14.x through 1.14.1 mishandles the DB argument, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request to modify a principal.
Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:krb5-1.12.1-28.1
SUSE Linux Enterprise Desktop 12 SP1:krb5-32bit-1.12.1-28.1
SUSE Linux Enterprise Desktop 12 SP1:krb5-client-1.12.1-28.1
SUSE Linux Enterprise Desktop 12:krb5-1.12.1-28.1
Ссылки
- CVE-2016-3119
- SUSE Bug 971942