Bug 717378 - Backport getaddrinfo workaround
Summary: Backport getaddrinfo workaround
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: krb5
Version: 6.1
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: rc
: ---
Assignee: Nalin Dahyabhai
QA Contact: BaseOS QE Security Team
URL:
Whiteboard:
Depends On:
Blocks: 733675
TreeView+ depends on / blocked
 
Reported: 2011-06-28 17:46 UTC by Simo Sorce
Modified: 2016-01-22 17:07 UTC (History)
3 users (show)

Fixed In Version: krb5-1.9-13.el6
Doc Type: Bug Fix
Doc Text:
Clone Of:
: 733675 (view as bug list)
Environment:
Last Closed: 2011-12-06 17:36:59 UTC
Target Upstream Version:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2011:1707 0 normal SHIPPED_LIVE krb5 bug fix update 2011-12-06 01:02:29 UTC

Description Simo Sorce 2011-06-28 17:46:46 UTC
getaddrinfo() apparently does PTR lookups if anything but AF_UNSPEC is set for the family.
In krb5_snam_to_principal() AF_INET was used and this causes PTR requests to be done even when rdns = false is set in krb5.conf
Moreover checking PTR records yields wrong canonicalization on networks where PTR records are wrong and can't be easily fixed.

This caused issues on a customer network.

Upstream has fixed this issue with ticket #6922
Commit: http://src.mit.edu/fisheye/changelog/krb5/?cs=24977

It would be nice to backport this fix asap.

Upstream bug #6923 is also related, but not critical so backporting can be postponed if considered too risky.

Comment 4 errata-xmlrpc 2011-12-06 17:36:59 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHBA-2011-1707.html


Note You need to log in before you can comment on or make changes to this bug.