Lucene search

K
suseSuseSUSE-SU-2015:0290-1
HistoryFeb 16, 2015 - 2:05 p.m.

Security update for krb5 (important)

2015-02-1614:05:49
lists.opensuse.org
14

0.018 Low

EPSS

Percentile

86.8%

MIT kerberos krb5 was updated to fix several security issues and bugs.

Security issues fixed: CVE-2014-5351: The kadm5_randkey_principal_3
function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5
(aka krb5) sent old keys in a response to a -randkey -keepold request,
which allowed remote authenticated users to forge tickets by leveraging
administrative access.

CVE-2014-5352: In the MIT krb5 libgssapi_krb5 library, after
gss_process_context_token() is used to process a valid context deletion
token, the caller was left with a security context handle containing a
dangling pointer. Further uses of this handle would have resulted in
use-after-free and double-free memory access violations. libgssrpc server
applications such as kadmind were vulnerable as they can be instructed to
call gss_process_context_token().

CVE-2014-9421: If the MIT krb5 kadmind daemon receives invalid XDR data
from an authenticated user, it may have performed use-after-free and
double-free memory access violations while cleaning up the partial
deserialization results. Other libgssrpc server applications might also
been vulnerable if they contain insufficiently defensive XDR functions.

CVE-2014-9422: The MIT krb5 kadmind daemon incorrectly accepted
authentications to two-component server principals whose first component
is a left substring of "kadmin" or whose realm is a left prefix of the
default realm.

CVE-2014-9423: libgssrpc applications including kadmind output four or
eight bytes of uninitialized memory to the network as part of an unused
"handle" field in replies to clients.

Bugs fixed:

  • Work around replay cache creation race; (bnc#898439).