krb5-1.6.1-17AXS3.1
エラータID: AXSA:2008-153:02
Kerberos V5 is a trusted-third-party network authentication system, which can improve your network's security by eliminating the insecure practice of cleartext passwords.
- add preliminary patch to fix use of uninitialized pointer / double-free in KDC (CVE-2008-0062,CVE-2008-0063)
- add backported patch to fix use-after-free in libgssapi_krb5 (CVE-2007-5901)
- add backported patch to fix double-free in libgssapi_krb5 (CVE-2007-5971)
- add preliminary patch to fix incorrect handling of high-numbered descriptors in the RPC library (CVE-2008-0947)
- fix storage of delegated krb5 credentials when they've been wrapped up in spnego
- return a delegated credential handle even if the application didn't pass a location to store the flags which would be used to indicate that credentials were delegated
- add patch to fall back to TCP kpasswd servers for kdc-unreachable, can't-resolve-server, and response-too-big errors
- use the right sequence numbers when generating password-set/change requests for kpasswd servers after the first one
- backport from 1.6.3 to initialize a library-allocated get_init_creds_opt structure the same way we would one which was allocated by the calling application, to restore kinit's traditional behavior of doing a password change right when it detects an expired password
- ftpd: also do PAM session and credential management when ftp clients use strong authentication
- update to revised patch for CVE-2007-3999
- fix omission of files created by the db2 plugin when labeling
- make krb5-workstation depend on the PAM configuration file used by login.krb5
- fix omission of kadmin log file when labeling
- add preliminary patch to fix buffer overflow in rpcsec_gss implementation in libgssrpc (CVE-2007-3999) and write through uninitialized pointer in kadmind (CVE-2007-4000)
- kdc: default to listening for TCP clients as well
- login: change to the user's home directory after dropping privileges, not before
- turn off the ldap features
- add a patch to allow applications to try to use a key with kvno=0, if found, in place of the "right" version for a request
- incorporate fixes for MITKRB5-SA-2007-004 (CVE-2007-2442,CVE-2007-2443) and MITKRB5-SA-2007-005 (CVE-2007-2798)
- reintroduce missing %postun for the non-split_workstation case
- add missing pam-devel build requirement, force selinux-or-fail build
- label all files at creation-time according to the SELinux policy
- perform PAM account / session management in krshd
- perform PAM authentication and account / session management in ftpd
- perform PAM authentication, account / session management, and password- changing in login.krb5
- preprocess kerberos.ldif into a format FDS will like better, and include that as a doc file as well
- switch man pages to being generated with the right paths in them
- drop old, incomplete SELinux patch
- add patch from Greg Hudson to make srvtab routines report missing-file errors at same point that keytab routines do
- pull patch from svn to undo unintentional chattiness in ftp
- pull patch from svn to handle NULL krb5_get_init_creds_opt structures better in a couple of places where they're expected
- update to 1.6.1
- drop no-longer-needed patches for CVE-2007-0956,CVE-2007-0957,CVE-2007-1216
- drop patch for sendto bug in 1.6, fixed in 1.6.1
- kadmind.init: don't fail outright if the default principal database isn't there if it looks like we might be using the kldap plugin
- kadmind.init: attempt to extract the key for the host-specific kadmin service when we try to create the keytab
- omit dependent libraries from the krb5-config --libs output, as using shared libraries (no more static libraries) makes them unnecessary and they're not part of the libkrb5 interface (strips out libkeyutils, libresolv, libdl)
- pull in keyutils as a build requirement to get the "KEYRING:" ccache type, because we've merged
- fix an uninitialized length value which could cause a crash when parsing key data coming from a directory server
- correct a typo in the krb5.conf man page ("ldap_server"->"ldap_servers")
- move the default acl_file, dict_file, and admin_keytab settings to the part of the default/example kdc.conf where they'll actually have an effect
- add patch to correct unauthorized access via krb5-aware telnetdaemon (CVE-2007-0956)
- add patch to fix buffer overflow in krb5kdc and kadmind(CVE-2007-0957)
- add patch to fix double-free in kadmind (CVE-2007-1216)
- back out buildrequires: keyutils-libs-devel for now
- add buildrequires: on keyutils-libs-devel to enab
Update Packages.
Double free vulnerability in the GSS-API library (lib/gssapi/krb5/k5unseal.c), as used by the Kerberos administration daemon (kadmind) in MIT krb5 before 1.6.1, when used with the authentication method provided by the RPCSEC_GSS RPC library, allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via a message with an "an invalid direction encoding".
Stack-based buffer overflow in the krb5_klog_syslog function in the kadm5 library, as used by the Kerberos administration daemon (kadmind) and Key Distribution Center (KDC), in MIT krb5 before 1.6.1 allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via crafted arguments, possibly involving certain format string specifiers.
The telnet daemon (telnetd) in MIT krb5 before 1.6.1 allows remote attackers to bypass authentication and gain system access via a username beginning with a '-' character, a similar issue to CVE-2007-0882.
The telnet daemon (telnetd) in MIT krb5 before 1.6.1 allows remote attackers to bypass authentication and gain system access via a username beginning with a '-' character, a similar issue to CVE-2007-0882.
Stack-based buffer overflow in the krb5_klog_syslog function in the kadm5 library, as used by the Kerberos administration daemon (kadmind) and Key Distribution Center (KDC), in MIT krb5 before 1.6.1 allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via crafted arguments, possibly involving certain format string specifiers.
Double free vulnerability in the GSS-API library (lib/gssapi/krb5/k5unseal.c), as used by the Kerberos administration daemon (kadmind) in MIT krb5 before 1.6.1, when used with the authentication method provided by the RPCSEC_GSS RPC library, allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via a message with an "an invalid direction encoding".
Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.
Integer signedness error in the gssrpc__svcauth_unix function in svc_auth_unix.c in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a negative length value.
The gssrpc__svcauth_gssapi function in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a zero-length RPC credential, which causes kadmind to free an uninitialized pointer during cleanup.
The kadm5_modify_policy_internal function in lib/kadm5/srv/svr_policy.c in the Kerberos administration daemon (kadmind) in MIT Kerberos 5 (krb5) 1.5 through 1.6.2 does not properly check return values when the policy does not exist, which might allow remote authenticated users with the "modify policy" privilege to execute arbitrary code via unspecified vectors that trigger a write to an uninitialized pointer.
Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.
Buffer overflow in the RPC library used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.4 through 1.6.3 allows remote attackers to execute arbitrary code by triggering a large number of open file descriptors.
Double free vulnerability in the gss_krb5int_make_seal_token_v3 function in lib/gssapi/krb5/k5sealv3.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors.
Use-after-free vulnerability in the gss_indicate_mechs function in lib/gssapi/mechglue/g_initialize.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors. NOTE: this might be the result of a typo in the source code.
The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."
KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free.
From Asianux Server 3 SP1 updated packages.
SRPMS
- krb5-1.6.1-17AXS3.1.src.rpm
MD5: 8df04476663dffa32d12b3df9f6632a9
SHA-256: 3e444cf2ed6259621b83016762a401cb5864b80f692a1170dcfaa95b7a7fdc4b
Size: 14.95 MB
Asianux Server 3 for x86
- krb5-devel-1.6.1-17AXS3.1.i386.rpm
MD5: 546eea513e7b5c997f8125edda59288f
SHA-256: f5128ba5814069d634dd45ba2bcdc5f716bb6066280fb6819b491d5a53212c20
Size: 1.86 MB - krb5-libs-1.6.1-17AXS3.1.i386.rpm
MD5: 9f2d9933b673bc685440ac563b16d548
SHA-256: ae94d74a3231cea55f2876cbd210bb56594fab0997f0805b13f6d341a7674e2b
Size: 653.56 kB - krb5-server-1.6.1-17AXS3.1.i386.rpm
MD5: 6e9c61c48df27586a695a23ba57fd05d
SHA-256: bb242fce0d8ccb4a226f8d0886a5249580e0098845f7f8c08f17af2e9c0d779a
Size: 901.44 kB - krb5-workstation-1.6.1-17AXS3.1.i386.rpm
MD5: a9f1a1458ab20b290d6ef3685037eb38
SHA-256: 8dc0afaf22172ed4e4558f4014c6e1725f91ac0bd309d560955face4a8a3c92d
Size: 818.38 kB
Asianux Server 3 for x86_64
- krb5-devel-1.6.1-17AXS3.1.x86_64.rpm
MD5: 1789d595de976c7031a182bf1f5e61c1
SHA-256: 211f14b7cbf178a4e87e69aca3f352f040941758ba16f7e9b9b010cc88988eea
Size: 1.88 MB - krb5-libs-1.6.1-17AXS3.1.x86_64.rpm
MD5: a9f23f318b7dac5aa258ab108befd892
SHA-256: 551306181a91fb0eee146612148cede52b8289532116725ad16ea5bb6c8073d2
Size: 662.53 kB - krb5-server-1.6.1-17AXS3.1.x86_64.rpm
MD5: 11547fa561ae7882bffc8e99920fb219
SHA-256: 80060b1ff16d7df0f4feb55d5c83990c28075c9c81e7342e998377dd7563e647
Size: 909.28 kB - krb5-workstation-1.6.1-17AXS3.1.x86_64.rpm
MD5: c5e3002ea7df2df30e1f24210741bc4f
SHA-256: d7a102b1650ea4c833ce953fb64a7e10eb712beb78e1a6012b7da55e49c7c869
Size: 844.49 kB