From Mageia wiki
Jump to: navigation, search

MGASA-2012-0196

Date: August 3rd, 2012
Affected releases: 1, 2


Description:
Updated krb5 packages fix security vulnerability:

The MIT krb5 KDC (Key Distribution Center) daemon can free an
uninitialized pointer while processing an unusual AS-REQ, corrupting
the process heap and possibly causing the daemon to abnormally
terminate. An attacker could use this vulnerability to execute
malicious code, but exploiting frees of uninitialized pointers to
execute code is believed to be difficult. It is possible that a
legitimate client that is misconfigured in an unusual way could
trigger this vulnerability (CVE-2012-1015).


Updated Packages:
Mageia 1:
krb5-1.8.3-5.4.mga1
krb5-pkinit-openssl-1.8.3-5.4.mga1
krb5-server-1.8.3-5.4.mga1
krb5-server-ldap-1.8.3-5.4.mga1
krb5-workstation-1.8.3-5.4.mga1
lib(64)krb53-1.8.3-5.4.mga1
lib(64)krb53-devel-1.8.3-5.4.mga1

Mageia 2:
krb5-1.9.2-2.3.mga2
krb5-pkinit-openssl-1.9.2-2.3.mga2
krb5-server-1.9.2-2.3.mga2
krb5-server-ldap-1.9.2-2.3.mga2
krb5-workstation-1.9.2-2.3.mga2
libk(64)rb53-1.9.2-2.3.mga2
libk(64)rb53-devel-1.9.2-2.3.mga2


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1015
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2012-001.txt
http://www.mandriva.com/en/support/security/advisories/?dis=2011&name=MDVSA-2012:111
https://bugs.mageia.org/show_bug.cgi?id=6929