It was reported that if krb5_unparse_name() fails, many of the stubs will leak the client and server name. In all versions of MIT krb5, an authenticated attacker can cause kadmind to leak memory by supplying a null principal name in a request which uses one. Repeating these requests will eventually cause kadmind to exhaust all available memory. Upstream patch: https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2
Created krb5 tracking bugs for this issue: Affects: fedora-all [bug 1302643]
Acknowledgements: This issue was discovered by Simo Sorce of Red Hat.
Upstream bug report: http://krbdev.mit.edu/rt/Ticket/Display.html?id=8343 Fixed upstream in krb5 1.14.1: http://web.mit.edu/kerberos/krb5-1.14/krb5-1.14.1.html The upstream bug report also indicates the issue will be fixed in 1.13.4.
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2016:0493 https://rhn.redhat.com/errata/RHSA-2016-0493.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:0532 https://rhn.redhat.com/errata/RHSA-2016-0532.html