Bug 1302617 (CVE-2015-8629)
Summary: | CVE-2015-8629 krb5: xdr_nullstring() doesn't check for terminating null character | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | abokovoy, carnil, cbuissar, csutherl, dknox, dpal, jclere, jdoyle, jplans, j, lgao, mbabacek, myarboro, nalin, npmccallum, pkis, rharwood, sardella, slawomir, twalsh, weli |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | krb5 1.14.1, krb5 1.13.4 | Doc Type: | Bug Fix |
Doc Text: |
An out-of-bounds read flaw was found in the kadmind service of MIT Kerberos. An authenticated attacker could send a maliciously crafted message to force kadmind to read beyond the end of allocated memory, and write the memory contents to the KDC database if the attacker has write permission, leading to information disclosure.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2016-04-01 07:07:23 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1302618, 1306969, 1306970, 1306973, 1306974 | ||
Bug Blocks: | 1302647 |
Description
Adam Mariš
2016-01-28 09:42:47 UTC
Created krb5 tracking bugs for this issue: Affects: fedora-all [bug 1302618] Upstream bug report: http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341 Fixed upstream in krb5 1.14.1: http://web.mit.edu/kerberos/krb5-1.14/krb5-1.14.1.html The upstream bug report also indicates the issue will be fixed in 1.13.4. This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2016:0493 https://rhn.redhat.com/errata/RHSA-2016-0493.html This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:0532 https://rhn.redhat.com/errata/RHSA-2016-0532.html |