Summary: | <app-crypt/mit-krb5-1.13: current keys returned when randomizing the keys for a service principal (CVE-2014-5351) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | kerberos |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1145425 | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2014-09-23 07:48:42 UTC
This is Fixed in version: 1.13 (currently in testing) http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not. Arches, please test and mark stable =app-crypt/mit-krb5-1.13. Thank you. Target Keywords="alpha amd64 arm hppa ia64 ppc ppc64 sparc x86" I guess this has to be STABLEREQ, not KEYWORDREQ. Stable for HPPA. arm stable amd64 stable x86 stable ppc stable ppc64 stable ia64 stable Stable on alpha. sparc stable GLSA vote: yes. @maintainers, please cleanup. CVE-2014-5351 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5351): The kadm5_randkey_principal_3 function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13 sends old keys in a response to a -randkey -keepold request, which allows remote authenticated users to forge tickets by leveraging administrative access. Added to existing glsa draft This issue was resolved and addressed in GLSA 201412-53 at http://security.gentoo.org/glsa/glsa-201412-53.xml by GLSA coordinator Mikle Kolyada (Zlogene). |