Ispravljen je propust u radu programskog paketa krb5 na operacijskim sustavima Fedora 13 i 14. Krb5 implementira protokol Kerberos koji se koristi za autentikaciju korisnika na računalnoj mreži. Propust se javlja u radu funkcije "prepare_error_as" u datoteci "do_as_req.c". Udaljeni, zlonamjerni korisnik može iskoristiti navedenu ranjivost kako bi izveo napad uskraćivanja usluga (eng. Denial of Service, DoS) ili eventualno pokrenuo zlonamjerni programski kod. Problem se rješava nadogradnjom paketa.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-3464
2011-03-16 19:34:37
--------------------------------------------------------------------------------
Name : krb5
Product : Fedora 13
Version : 1.7.1
Release : 18.fc13
URL : http://web.mit.edu/kerberos/www/
Summary : The Kerberos network authentication system
Description :
Kerberos V5 is a trusted-third-party network authentication system,
which can improve your network's security by eliminating the insecure
practice of cleartext passwords.
--------------------------------------------------------------------------------
Update Information:
This update incorporates upstream fixes for a double-free in the KDC which
could occur if the KDC needed to send back typed-data along with an error
(MITKRB5-SA-2011-003, CVE-2011-0284).
--------------------------------------------------------------------------------
ChangeLog:
* Tue Mar 15 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.7.1-18
- add revised upstream patch to fix double-free in KDC while returning
typed-data with errors (CVE-2011-0284, #674325)
* Tue Feb 8 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.7.1-17
- add upstream patches to fix standalone kpropd exiting if the per-client
child process exits with an error (MITKRB5-SA-2011-001), and a hang or
crash in the KDC when using the LDAP kdb backend (MITKRB5-SA-2011-002)
(CVE-2010-4022, #664009, CVE-2011-0281, #668719, CVE-2011-0282, #668726)
* Tue Nov 30 2010 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.7.1-16
- add upstream patch to fix various issues from MITKRB5-SA-2010-007
(CVE-2010-1323, #648734, CVE-2010-1324, #648674)
* Thu Sep 23 2010 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.7.1-15
- make -libs actually own /usr/kerberos, because it may be the only reason
that directory exists, due to owning /usr/kerberos/share (#636746)
* Mon Sep 13 2010 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.7.1-14
- revert pathmunge-related changes because pathmunge() isn't always there
if we've upgraded or anything weird's happened (#633212)
* Wed Aug 25 2010 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.7.1-13
- adjust the last patch to apply properly to 1.7.1
* Tue Aug 24 2010 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.7.1-12
- fix a logic bug in computing key expiration times (RT#6762, #627022)
* Mon Jun 21 2010 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.>
- pull up fix for upstream #6745, in which the gssapi library would add the
wrong error table but subsequently attempt to unload the right one
* Wed Jun 9 2010 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.7.1-11
- use the "pathmunge" function to add %{krb5prefix}/bin to $PATH rather
than doing it the harder way ourselves (part of #544652)
* Thu May 27 2010 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.>
- ksu: move session management calls to before we drop privileges, like
su does (#596887), and don't skip the PAM account check for root or the
same user (more of #540769)
* Tue May 18 2010 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.7.1-10
- add patch to correct GSSAPI library null pointer dereference which could be
triggered by malformed client requests (CVE-2010-1321, #582466)
* Tue May 4 2010 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.7.1-9
- fix output of kprop's init script's "status" and "reload" commands (#588222)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #674325 - CVE-2011-0284 krb5 (krb5kdc): Double-free flaw by
handling error messages upon receiving certain AS_REQ's (MITKRB5-SA-2011-003)
https://bugzilla.redhat.com/show_bug.cgi?id=674325
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update krb5' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-3462
2011-03-16 19:34:33
--------------------------------------------------------------------------------
Name : krb5
Product : Fedora 14
Version : 1.8.2
Release : 9.fc14
URL : http://web.mit.edu/kerberos/www/
Summary : The Kerberos network authentication system
Description :
Kerberos V5 is a trusted-third-party network authentication system,
which can improve your network's security by eliminating the insecure
practice of cleartext passwords.
--------------------------------------------------------------------------------
Update Information:
This update incorporates upstream fixes for a double-free in the KDC which
could occur if the KDC needed to send back typed-data along with an error
(MITKRB5-SA-2011-003, CVE-2011-0284).
--------------------------------------------------------------------------------
ChangeLog:
* Tue Mar 15 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.8.2-9
- add revised upstream patch to fix double-free in KDC while returning
typed-data with errors (CVE-2011-0284, #674325)
* Tue Feb 8 2011 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.8.2-8
- add upstream patches to fix standalone kpropd exiting if the per-client
child process exits with an error (MITKRB5-SA-2011-001), and a hang or
crash in the KDC when using the LDAP kdb backend (MITKRB5-SA-2011-002)
(CVE-2010-4022, #664009, CVE-2011-0281, #668719, CVE-2011-0282, #668726)
* Tue Nov 30 2010 Nalin Dahyabhai <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.8.2-7
- pull up 1.8.2/1.8.3 libk5crypto changes to correct the patch context
- add upstream patch to fix various issues from MITKRB5-SA-2010-007
(CVE-2010-1323, #648734, CVE-2010-1324, #648674, CVE-2010-4020, #648735)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #674325 - CVE-2011-0284 krb5 (krb5kdc): Double-free flaw by
handling error messages upon receiving certain AS_REQ's (MITKRB5-SA-2011-003)
https://bugzilla.redhat.com/show_bug.cgi?id=674325
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update krb5' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke