Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1349042 - Incorrect length calculation in libkrad
Incorrect length calculation in libkrad
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: krb5 (Show other bugs)
7.3
Unspecified Unspecified
unspecified Severity unspecified
: rc
: ---
Assigned To: Robbie Harwood
Patrik Kis
:
: 1344031 (view as bug list)
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2016-06-22 11:04 EDT by Nathaniel McCallum
Modified: 2016-11-03 16:25 EDT (History)
5 users (show)

See Also:
Fixed In Version: krb5-1.14.1-18.el7
Doc Type: Bug Fix
Doc Text:
Cause: Incorrect length calculation in libkrad Consequence: ipa-otpd may experience timeouts Fix: Check length correctly Result: No more timeouts
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-11-03 16:25:29 EDT
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:2591 normal SHIPPED_LIVE Low: krb5 security, bug fix, and enhancement update 2016-11-03 08:10:29 EDT

  None (edit)
Description Nathaniel McCallum 2016-06-22 11:04:50 EDT
Upstream pull request: https://github.com/krb5/krb5/pull/471
Comment 7 Robbie Harwood 2016-06-29 11:16:21 EDT
*** Bug 1344031 has been marked as a duplicate of this bug. ***
Comment 11 thibaut.pouzet 2016-08-09 10:12:07 EDT
Should I be worried about this bug becoming a security issue if properly exploited ?
Comment 12 Robbie Harwood 2016-08-09 11:18:26 EDT
(In reply to thibaut.pouzet from comment #11)
> Should I be worried about this bug becoming a security issue if properly
> exploited ?

If exploited, it's a network-controlled write past the end of a buffer.  This buffer is on the heap, so it's very hard (though not impossible) to actually exploit.  That this issue may cause sporadic application failures was deemed a more pressing issue.
Comment 14 errata-xmlrpc 2016-11-03 16:25:29 EDT
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHSA-2016-2591.html

Note You need to log in before you can comment on or make changes to this bug.