lp:ubuntu/dapper-security/krb5

Created by James Westby and last modified
Get this branch:
bzr branch lp:ubuntu/dapper-security/krb5
Members of Ubuntu branches can upload to this branch. Log in for directions.

Branch merges

Related bugs

Related blueprints

Branch information

Owner:
Ubuntu branches
Review team:
Ubuntu Development Team
Status:
Mature

Recent revisions

17. By Marc Deslauriers

* SECURITY UPDATE: message forgery and privilege escalation via
  unacceptable checksums
  - src/lib/crypto/krb/dk/derive.c, src/lib/crypto/krb/keyed_checksum_types.c,
    src/lib/krb5/krb/mk_safe.c, src/lib/krb5/krb/preauth2.c,
    src/plugins/preauth/pkinit/pkinit_srv.c: patched inline, thanks to
    upstream.
  - CVE-2010-1323
  - MITKRB5-SA-2010-007

16. By Kees Cook

* SECURITY UPDATE: unauthenticated remote attacker can crash kadmind.
  - debian/patches/MITKRB5-SA-2010-005: applied upstream fixes inline
  - CVE-2010-1321
* SECURITY UPDATE: potential service crashes.
  - applied inline, backported from upstream svn:
    - debian/patches/CVE-2007-5902
    - debian/patches/CVE-2007-5971
    - debian/patches/CVE-2007-5972

15. By Kees Cook

* SECURITY UPDATE: unauthenticated remote attacker can crash or
  compromise the KDC via flaws in AES and RC4 decryption (CVE-2009-4212).
  - debian/patches/MITKRB5-SA-2009-004 backported and applied inline.
  - http://web.mit.edu/kerberos/advisories/2009-004-patch_1.6.3.txt

14. By Kees Cook

* SECURITY UPDATE: denial of service via memory corruption.
  - src/lib/krb5/asn.1/asn1_decode.c: ASN.1 decoder freed uninitialized
    pointers (MITKRB5-SA-2009-002: CVE-2009-0846).

13. By Kees Cook

* SECURITY UPDATE: arbitrary code execution via freed pointer and memory
  overflows.
* src/kdc/{kerberos_v4,dispatch,network}.c: backported upstream fixes
  patched inline (MITKRB5-SA-2008-001: CVE-2008-0062, CVE-2008-0063).
* src/lib/rpc/{svc,svc_tcp}.c: upstream fixed patched inline
  (MITKRB5-SA-2008-002: CVE-2008-0947)

12. By Kees Cook

* SECURITY UPDATE: 32 byte stack overflow in rpcsec_gss.
* src/lib/rpc/svc_auth_gss.c: new upstream changes, patched inline.
* References
  MIT-SA-2007-06
  CVE-2007-4743

11. By Kees Cook

* SECURITY UPDATE: stack overflow in rpcsec_gss.
* src/lib/rpc/svc_auth_gss.c: upstream changes patched inline.
* References
  MIT-SA-2007-06
  CVE-2007-3999

10. By Kees Cook

* SECURITY UPDATE: multiple remote code execution vectors.
* src/lib/rpc/svc_auth_{gssapi,unix}.c: backported upstream fixes for
  MITKRB5-SA-2007-004 (CVE-2007-2442, CVE-2007-2443).
* src/kadmin/server/server_stubs.c: backported upstream fixes for
  MITKRB5-SA-2007-005 (CVE-2007-2798).

9. By Kees Cook

* SECURITY UPDATE: arbitrary login via telnet, arbitrary code execution
  via syslog buffer overflows, and heap corruption via GSS api.
* src/appl/telnet/telnetd/{state,sys_term}.c: MIT-SA-2007-1 fix from
  upstream (CVE-2007-0956).
* src/lib/kadm5/logger.c: MIT-SA-2007-2 fix from Debian, based on
  upstream fixes (CVE-2007-0957).
* src/lib/gssapi/krb5/k5unseal.c: MIT-SA-2007-3 fix from upstream
  (CVE-2007-1216).
* References
  http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-001-telnetd.txt
  http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-002-syslog.txt
  http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-003.txt

8. By Martin Pitt

* SECURITY UPDATE: Remote privilege escalation.
* src/lib/rpc/svc.c:
  - Do not call an uninitialized pointer.
  - Patch provided by upstream.
  - References:
    CVE-2006-6143
    http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-002-rpc.txt

Branch metadata

Branch format:
Branch format 7
Repository format:
Bazaar repository format 2a (needs bzr 1.16 or later)
Stacked on:
lp:ubuntu/lucid/krb5
This branch contains Public information 
Everyone can see this information.

Subscribers