Bug 1278951 - (CVE-2015-2698) CVE-2015-2698 krb5: IAKERB context export/import
CVE-2015-2698 krb5: IAKERB context export/import
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 1278952
Blocks: 1275873
  Show dependency treegraph
Reported: 2015-11-06 15:22 EST by Kurt Seifried
Modified: 2015-12-10 05:09 EST (History)
7 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2015-12-10 05:09:27 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Kurt Seifried 2015-11-06 15:22:53 EST
The kerberos project reports:

The patches for CVE-2015-2696 contained a regression in the newly
added IAKERB iakerb_gss_export_sec_context() function, which could
cause it to corrupt memory.  Fix the regression by properly
dereferencing the context_handle pointer before casting it.

Also, the patches did not implement an IAKERB gss_import_sec_context()
function, under the erroneous belief that an exported IAKERB context
would be tagged as a krb5 context.  Implement it now to allow IAKERB
contexts to be successfully exported and imported after establishment.


In any MIT krb5 release with the patches for CVE-2015-2696 applied, an
application which calls gss_export_sec_context() may experience memory
corruption if the context was established using the IAKERB mechanism.
Historically, some vulnerabilities of this nature can be translated
into remote code execution, though the necessary exploits must be
tailored to the individual application and are usually quite

External reference:
Comment 1 Kurt Seifried 2015-11-06 15:23:53 EST
Created krb5 tracking bugs for this issue:

Affects: fedora-all [bug 1278952]
Comment 3 Stefan Cornelius 2015-12-10 05:08:45 EST

This issue did not affect the versions of krb5 as shipped with Red Hat Enterprise Linux 4, 5, 6, and 7.

Note You need to log in before you can comment on or make changes to this bug.