Описание
Security update for libheimdal
This update for libheimdal to version 7.5.0 fixes the following issues:
The following security vulnerability was fixed:
- CVE-2017-17439: Fixed a remote denial of service vulnerability through which remote unauthenticated attackers were able to crash the KDC by sending a crafted UDP packet containing empty data fields for client name or realm (boo#1071675)
The following other bugs were fixed:
- Override the build date (boo#1047218)
- Use constant hostname (boo#1084909)
- Handle long input lines when reloading database dumps
- In pre-forked mode, correctly clear the process ids of exited children, allowing new child processes to replace the old.
- Fixed incorrect KDC response when no-cross realm TGT exists, allowing client requests to fail quickly rather than time out after trying to get a correct answer from each KDC.
Список пакетов
openSUSE Leap 42.3
libheimdal-7.5.0-9.1
libheimdal-devel-7.5.0-9.1
Ссылки
- E-Mail link for openSUSE-SU-2018:2376-1
- SUSE Security Ratings
Описание
In Heimdal through 7.4, remote unauthenticated attackers are able to crash the KDC by sending a crafted UDP packet containing empty data fields for client name or realm. The parser would unconditionally dereference NULL pointers in that case, leading to a segmentation fault. This is related to the _kdc_as_rep function in kdc/kerberos5.c and the der_length_visible_string function in lib/asn1/der_length.c.
Затронутые продукты
openSUSE Leap 42.3:libheimdal-7.5.0-9.1
openSUSE Leap 42.3:libheimdal-devel-7.5.0-9.1
Ссылки
- CVE-2017-17439
- SUSE Bug 1071675