Описание
Security update for krb5
This update for krb5 fixes the following security issue:
- CVE-2016-3119: An authenticated attacker with permission to modify a principal entry could have caused kadmind to dereference a null pointer by supplying an empty DB argument to the modify_principal command, if kadmind is configured to use the LDAP KDB module. (bsc#971942)
This update was imported from the SUSE:SLE-12:Update update project.
Список пакетов
openSUSE Leap 42.1
krb5-1.12.1-30.1
krb5-32bit-1.12.1-30.1
krb5-client-1.12.1-30.1
krb5-devel-1.12.1-30.1
krb5-devel-32bit-1.12.1-30.1
krb5-doc-1.12.1-30.1
krb5-mini-1.12.1-30.1
krb5-mini-devel-1.12.1-30.1
krb5-plugin-kdb-ldap-1.12.1-30.1
krb5-plugin-preauth-otp-1.12.1-30.1
krb5-plugin-preauth-pkinit-1.12.1-30.1
krb5-server-1.12.1-30.1
Ссылки
- E-Mail link for openSUSE-SU-2016:1072-1
- SUSE Security Ratings
Описание
The process_db_args function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) through 1.13.4 and 1.14.x through 1.14.1 mishandles the DB argument, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request to modify a principal.
Затронутые продукты
openSUSE Leap 42.1:krb5-1.12.1-30.1
openSUSE Leap 42.1:krb5-32bit-1.12.1-30.1
openSUSE Leap 42.1:krb5-client-1.12.1-30.1
openSUSE Leap 42.1:krb5-devel-1.12.1-30.1
Ссылки
- CVE-2016-3119
- SUSE Bug 971942