Objavljena je nadogradnja programskog paketa krb5. Propuste je udaljeni napadač mogao iskoristiti za izvođenje DoS napada, izvršavanje zlonamjernog programskog koda, otkrivanje osjetljivih informacija, izmjenu/lažiranje raznih podataka ili dobivanje većih privilegija.
Paket: | krb 5.x |
Operacijski sustavi: | Fedora 14, Fedora 15 |
Kritičnost: | 8.4 |
Problem: | cjelobrojno prepisivanje, pogreška u programskoj funkciji, pogreška u programskoj komponenti |
Iskorištavanje: | udaljeno |
Posljedica: | dobivanje većih privilegija, izmjena podataka, otkrivanje osjetljivih informacija, proizvoljno izvršavanje programskog koda, uskraćivanje usluga (DoS) |
Rješenje: | programska zakrpa proizvođača |
CVE: | CVE-2011-1527, CVE-2011-1528, CVE-2011-1529, CVE-2010-4022, CVE-2011-0281, CVE-2011-0282, CVE-2011-0283, CVE-2011-0284, CVE-2011-0285, CVE-2011-0041, CVE-2010-1322, CVE-2010-1323, CVE-2010-1324, CVE-2010-4020 |
Izvorni ID preporuke: | FEDORA-2011-14673 |
Izvor: | Fedora |
Problem: | |
Propusti su uzrokovani pogreškama u funkcijama "krb5_ldap_lockout_audit()", " lookup_lockout_policy()", "do_standalone()" , "prepare_error_as()", "process_chpw_request()" , "merge_authdata()", datoteci "gdiplus.dll" i Key Distribution Center(KDC) implementaciji. |
|
Posljedica: | |
Navedene propuste udaljeni napadač može iskoristiti za izvođenje DoS napada, pokretanje proizvoljnog programskog koda, pregled poataka, izmjenu/lažiranje raznih podataka ili dobivanje većih ovlasti. |
|
Rješenje: | |
Svim se korisnicima navedenog programskog paketa, u svrhu zaštite sigurnosti, savjetuje njegova nadogradnja na novije inačice. |
Izvorni tekst preporuke
---------------------------------------------------------------------------=
-----
Fedora Update Notification
FEDORA-2011-14673
2011-10-20 09:35:42
---------------------------------------------------------------------------=
-----
Name : krb5
Product : Fedora 15
Version : 1.9.1
Release : 14.fc15
URL : http://web.mit.edu/kerberos/www/
Summary : The Kerberos network authentication system
Description :
Kerberos V5 is a trusted-third-party network authentication system,
which can improve your network's security by eliminating the insecure
practice of cleartext passwords.
---------------------------------------------------------------------------=
-----
Update Information:
This update applies the upstream patch to fix a null pointer dereference wi=
th the LDAP kdb backend (CVE-2011-1527, #744125), an assertion failure with=
multiple kdb backends (CVE-2011-1528), and a null pointer dereference with=
multiple kdb backends (CVE-2011-1529). (#737711)
It also rolls up a number of mostly-minor fixes, some of which were backpor=
ted from upstream to the Fedora 16 branch. The main user-visible change is=
a fix for cross-realm authentication in the client libraries.
---------------------------------------------------------------------------=
-----
ChangeLog:
* Tue Oct 18 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.9.1-14
- apply upstream patch to fix a null pointer dereference with the LDAP kdb
backend (CVE-2011-1527, #744125), an assertion failure with multiple kdb
backends (CVE-2011-1528), and a null pointer dereference with multiple kdb
backends (CVE-2011-1529) (#737711)
* Wed Oct 12 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.9.1-13
- handle a harder-to-trigger assertion failure that starts cropping up when=
we
exit the transmit loop on time (#739853)
* Tue Sep 6 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.9.1-12
- pull in upstream patch for RT#6952, confusion following referrals for
cross-realm auth (#734341)
- pull in build-time deps for the tests
* Thu Sep 1 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.9.1-11
- switch to the upstream patch for #727829
* Wed Aug 31 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.9.1-10
- handle an assertion failure that starts cropping up when the patch for
using poll (#701446) meets servers that aren't running KDCs or against
which the connection fails for other reasons (#727829, #734172)
* Mon Aug 8 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.9.1-9
- override the default build rules to not delete temporary y.tab.c files,
so that they can be packaged, allowing debuginfo files which point to them
do so usefully (#729044)
* Fri Jul 22 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.9.1-8
- build shared libraries with partial RELRO support (#723995)
- filter out potentially multiple instances of -Wl,-z,relro from krb5-config
output, now that it's in the buildroot's default LDFLAGS
- pull in a patch to fix losing track of the replay cache FD, from SVN by
way of Kevin Coffman
* Wed Jul 20 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.9.1-7
- kadmind.init: drop the attempt to detect no-database-present errors (#723=
723)
* Tue Jul 19 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.9.1-6
- backport fixes to teach libkrb5 to use descriptors higher than FD_SETSIZE
to talk to a KDC by using poll() if it's detected at compile-time (#70144=
6,
RT#6905)
* Thu Jun 23 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.9.1-5
- pull a fix from SVN to try to avoid triggering a PTR lookup in getaddrinf=
o()
during krb5_sname_to_principal(), and to let getaddrinfo() decide whether=
or
not to ask for an IPv6 address based on the set of configured interfaces
(#717378, RT#6922)
- pull a fix from SVN to use AI_ADDRCONFIG more often (RT#6923)
* Mon Jun 20 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.9.1-4
- apply upstream patch by way of Burt Holzman to fall back to a non-referral
method in cases where we might be derailed by a KDC that rejects the
canonicalize option (for example, those from the RHEL 2.1 or 3 era) (#715=
074)
* Tue Jun 14 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.9.1-3
- pull a fix from SVN to get libgssrpc clients (e.g. kadmin) authenticating
using the old protocol over IPv4 again (RT#6920)
* Tue Jun 14 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.>
- incorporate a fix to teach the file labeling bits about when replay caches
are expunged (#576093)
* Thu May 26 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.>
- switch to the upstream patch for #707145
* Wed May 25 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.9.1-2
- klist: don't trip over referral entries when invoked with -s (#707145,
RT#6915)
* Fri May 6 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.>
- fixup URL in a comment
- when built with NSS, require 3.12.10 rather than 3.12.9
* Thu May 5 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.9.1-1
- update to 1.9.1:
- drop no-longer-needed patches for CVE-2010-4022, CVE-2011-0281,
CVE-2011-0282, CVE-2011-0283, CVE-2011-0284, CVE-2011-0285
---------------------------------------------------------------------------=
-----
References:
[ 1 ] Bug #737711 - CVE-2011-1527 CVE-2011-1528 CVE-2011-1529 CVE-2011-41=
51 krb5: KDC denial of service vulnerabilities (MITKRB5-SA-2011-006)
https://bugzilla.redhat.com/show_bug.cgi?id=3D737711
---------------------------------------------------------------------------=
-----
This update can be installed with the "yum" update program. Use =
su -c 'yum update krb5' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on t=
he
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
---------------------------------------------------------------------------=
-----
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
---------------------------------------------------------------------------=
-----
Fedora Update Notification
FEDORA-2011-14650
2011-10-20 09:34:45
---------------------------------------------------------------------------=
-----
Name : krb5
Product : Fedora 14
Version : 1.8.4
Release : 3.fc14
URL : http://web.mit.edu/kerberos/www/
Summary : The Kerberos network authentication system
Description :
Kerberos V5 is a trusted-third-party network authentication system,
which can improve your network's security by eliminating the insecure
practice of cleartext passwords.
---------------------------------------------------------------------------=
-----
Update Information:
This update applies the upstream patch to fix a null pointer dereference wi=
th the LDAP kdb backend (CVE-2011-1527), an assertion failure with multiple=
kdb backends (CVE-2011-1528), and a null pointer dereference with multiple=
kdb backends (CVE-2011-1529). (#737711)
---------------------------------------------------------------------------=
-----
ChangeLog:
* Tue Oct 18 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.8.4-3
- apply upstream patch to fix a null pointer dereference with the LDAP kdb
backend (CVE-2011-1527, #744125), an assertion failure with multiple kdb
backends (CVE-2011-1528), and a null pointer dereference with multiple kdb
backends (CVE-2011-1529) (#737711)
* Fri Jun 24 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.8.4-2
- incorporate a fix to teach the file labeling patch about when replay cach=
es
are expunged (#576093)
- switch to the upstream patch for #707145
* Thu Jun 23 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.>
- drop not-needed-since-1.8 build dependency on rsh (ssorce)
* Thu Jun 23 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.8.4-1
- update to 1.8.4
- drop obsolete patch for upstream #6745
- drop obsolete patch for upstream #6739, to stop returning context-expir=
ed
errors when the ticket which was used to set up the context expires
- drop obsolete patch for upstream #6745, to fix KDC parsing of the -P op=
tion
- drop obsolete patch for CVE-2010-1322
- drop obsolete prerequisite patch for MITKRB5-SA-2010-007
- drop obsolete patch for MITKRB5-SA-2010-007
- drop obsolete patch for MITKRB5-SA-2011-001
- drop obsolete patch for MITKRB5-SA-2011-002
- drop obsolete patch for MITKRB5-SA-2011-003
- drop obsolete patch for MITKRB5-SA-2011-004
- no more need to munge the kdb ldif to fix upstream #6701
* Wed May 25 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.8.2-11
- klist: don't trip over referral entries when invoked with -s (#707145,
RT#6915)
* Wed Apr 13 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.8.2-10
- kadmind: add upstream patch to fix free() on an invalid pointer (#696343,
MITKRB5-SA-2011-004, CVE-2011-0285)
* Fri Mar 18 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.>
- backport change from SVN to fix a computed-value-not-used warning in
kpropd (#684065)
* Tue Mar 15 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.8.2-9
- add revised upstream patch to fix double-free in KDC while returning
typed-data with errors (CVE-2011-0284, #674325)
* Tue Feb 8 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.8.2-8
- add upstream patches to fix standalone kpropd exiting if the per-client
child process exits with an error (MITKRB5-SA-2011-001), and a hang or
crash in the KDC when using the LDAP kdb backend (MITKRB5-SA-2011-002)
(CVE-2010-4022, #664009, CVE-2011-0281, #668719, CVE-2011-0282, #668726)
* Tue Nov 30 2010 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.8.2-7
- pull up 1.8.2/1.8.3 libk5crypto changes to correct the patch context
- add upstream patch to fix various issues from MITKRB5-SA-2010-007
(CVE-2010-1323, #648734, CVE-2010-1324, #648674, CVE-2010-4020, #648735)
---------------------------------------------------------------------------=
-----
References:
[ 1 ] Bug #737711 - CVE-2011-1527 CVE-2011-1528 CVE-2011-1529 CVE-2011-41=
51 krb5: KDC denial of service vulnerabilities (MITKRB5-SA-2011-006)
https://bugzilla.redhat.com/show_bug.cgi?id=3D737711
---------------------------------------------------------------------------=
-----
This update can be installed with the "yum" update program. Use =
su -c 'yum update krb5' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on t=
he
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
---------------------------------------------------------------------------=
-----
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke