Bug 2165827
| Summary: | CVE-2022-37967: MS-PAC extended KDC signature [rhel-9] | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 9 | Reporter: | Julien Rische <jrische> | |
| Component: | krb5 | Assignee: | Julien Rische <jrische> | |
| Status: | CLOSED ERRATA | QA Contact: | Filip Dvorak <fdvorak> | |
| Severity: | unspecified | Docs Contact: | Filip Hanzelka <fhanzelk> | |
| Priority: | unspecified | |||
| Version: | 9.2 | CC: | fdvorak, fhanzelk, gfialova | |
| Target Milestone: | rc | Keywords: | Triaged | |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
|
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | krb5-1.20.1-6.el9 | Doc Type: | Enhancement | |
| Doc Text: |
.MIT Kerberos supports the Ticket and Extended KDC MS-PAC signatures
With this update, MIT Kerberos, which is used by Red Hat, implements support for two types of the Privilege Attribute Certificate (PAC) signatures introduced by Microsoft in response to recent CVEs. Specifically, the following signatures are supported:
* Ticket signature
** Released in link:https://support.microsoft.com/en-au/topic/kb4598347-managing-deployment-of-kerberos-s4u-changes-for-cve-2020-17049-569d60b7-3267-e2b0-7d9b-e46d770332ab[KB4598347]
** Addressing link:https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17049[CVE-2020-17049], also known as the "Bronze-Bit" attack
* Extended KDC signature
** Released in link:https://support.microsoft.com/en-us/topic/kb5020805-how-to-manage-kerberos-protocol-changes-related-to-cve-2022-37967-997e9acc-67c5-48e1-8d0d-190269bf4efb[KB5020805]
** Addressing link:https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967[CVE-2022-37967]
See also link:https://access.redhat.com/errata/RHSA-2023:2570[RHSA-2023:2570] and `krb5-1.20.1-6.el9`.
|
Story Points: | --- | |
| Clone Of: | ||||
| : | 2166001 2169477 (view as bug list) | Environment: | ||
| Last Closed: | 2023-05-09 08:25:24 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 2166001, 2169477, 2182135 | |||
|
Description
Julien Rische
2023-01-31 08:49:07 UTC
The fix is available upstream: https://github.com/krb5/krb5/pull/1284 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: krb5 security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2023:2570 |