Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update: mit-krb5 #1159

Closed
dongsupark opened this issue Aug 11, 2023 · 0 comments · Fixed by flatcar/scripts#1177
Closed

update: mit-krb5 #1159

dongsupark opened this issue Aug 11, 2023 · 0 comments · Fixed by flatcar/scripts#1177
Labels
advisory security advisory cvss/MEDIUM >= 4 && < 7 assessed CVSS security security concerns

Comments

@dongsupark
Copy link
Member

dongsupark commented Aug 11, 2023

Name: mit-krb5
CVEs: CVE-2023-36054
CVSSs: 6.5
Action Needed: update to >= 1.20.2 or >= 1.21.1

Summary: lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.

See also https://bugzilla.redhat.com/show_bug.cgi?id=2230178.

refmap.gentoo: TBD

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
advisory security advisory cvss/MEDIUM >= 4 && < 7 assessed CVSS security security concerns
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant