From Mageia wiki
Jump to: navigation, search

MGASA-2013-0131

Date: May 2nd, 2013
Affected releases: 2
Media: Core


Description:
Updated krb5 packages fix security vulnerability:

A NULL pointer dereference flaw was found in the way the MIT Kerberos
KDC processed certain TGS (Ticket-granting Server) requests. A remote,
authenticated attacker could use this flaw to crash the KDC via a
specially-crafted TGS request (CVE-2013-1416).


Updated Packages:
i586:
krb5-1.9.2-2.5.mga2.i586.rpm
krb5-pkinit-openssl-1.9.2-2.5.mga2.i586.rpm
krb5-server-1.9.2-2.5.mga2.i586.rpm
krb5-server-ldap-1.9.2-2.5.mga2.i586.rpm
krb5-workstation-1.9.2-2.5.mga2.i586.rpm
libkrb53-1.9.2-2.5.mga2.i586.rpm
libkrb53-devel-1.9.2-2.5.mga2.i586.rpm
krb5-debug-1.9.2-2.5.mga2.i586.rpm

x86_64:
krb5-1.9.2-2.5.mga2.x86_64.rpm
krb5-pkinit-openssl-1.9.2-2.5.mga2.x86_64.rpm
krb5-server-1.9.2-2.5.mga2.x86_64.rpm
krb5-server-ldap-1.9.2-2.5.mga2.x86_64.rpm
krb5-workstation-1.9.2-2.5.mga2.x86_64.rpm
lib64krb53-1.9.2-2.5.mga2.x86_64.rpm
lib64krb53-devel-1.9.2-2.5.mga2.x86_64.rpm
krb5-debug-1.9.2-2.5.mga2.x86_64.rpm

SRPMS:
krb5-1.9.2-2.5.mga2.src.rpm


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1416
https://rhn.redhat.com/errata/RHSA-2013-0748.html
https://bugs.mageia.org/show_bug.cgi?id=9778