"There will be an MIT krb5 security advisory on November 15, 2022, with
corresponding patch releases 1.20.1 and 1.19.4. The KDC, kadmind, and
GSS and Kerberos application servers are affected. The impact is
significantly reduced on 64-bit platforms."
An authenticated attacker may be able to cause a KDC or kadmind
process to crash by reading beyond the bounds of allocated memory,
creating a denial of service. A privileged attacker may similarly be
able to cause a Kerberos or GSS application service to crash.
On a 32-bit platform, an authenticated attacker may be able to cause
heap corruption in a KDC or kadmind process, possibly leading to
remote code execution. A privileged attacker may similarly be able to
cause heap corruption in a Kerberos or GSS application service running
on a 32-bit platform.
An attacker with the privileges of a cross-realm KDC may be able to
extract secrets from a KDC process's memory by having them copied into
the PAC of a new ticket.
* Upcoming releases in the krb5-1.19 and krb5-1.20 series will contain
fixes for these vulnerabilities."
I guess we're still waiting.
The bug has been referenced in the following commit(s):
Author: Eray Aslan <firstname.lastname@example.org>
AuthorDate: 2022-11-28 11:39:18 +0000
Commit: Eray Aslan <email@example.com>
CommitDate: 2022-11-28 11:39:18 +0000
app-crypt/mit-krb5: drop 1.20
Signed-off-by: Eray Aslan <firstname.lastname@example.org>
app-crypt/mit-krb5/Manifest | 1 -
app-crypt/mit-krb5/mit-krb5-1.20.ebuild | 148 --------------------------------
2 files changed, 149 deletions(-)