lp:ubuntu/dapper-security/krb5
- Get this branch:
- bzr branch lp:ubuntu/dapper-security/krb5
Branch merges
Branch information
Recent revisions
- 17. By Marc Deslauriers
-
* SECURITY UPDATE: message forgery and privilege escalation via
unacceptable checksums
- src/lib/crypto/ krb/dk/ derive. c, src/lib/ crypto/ krb/keyed_ checksum_ types.c,
src/lib/krb5/ krb/mk_ safe.c, src/lib/ krb5/krb/ preauth2. c,
src/plugins/ preauth/ pkinit/ pkinit_ srv.c: patched inline, thanks to
upstream.
- CVE-2010-1323
- MITKRB5-SA-2010-007 - 16. By Kees Cook
-
* SECURITY UPDATE: unauthenticated remote attacker can crash kadmind.
- debian/patches/ MITKRB5- SA-2010- 005: applied upstream fixes inline
- CVE-2010-1321
* SECURITY UPDATE: potential service crashes.
- applied inline, backported from upstream svn:
- debian/patches/ CVE-2007- 5902
- debian/patches/ CVE-2007- 5971
- debian/patches/ CVE-2007- 5972 - 15. By Kees Cook
-
* SECURITY UPDATE: unauthenticated remote attacker can crash or
compromise the KDC via flaws in AES and RC4 decryption (CVE-2009-4212).
- debian/patches/ MITKRB5- SA-2009- 004 backported and applied inline.
- http://web.mit. edu/kerberos/ advisories/ 2009-004- patch_1. 6.3.txt - 14. By Kees Cook
-
* SECURITY UPDATE: denial of service via memory corruption.
- src/lib/krb5/asn. 1/asn1_ decode. c: ASN.1 decoder freed uninitialized
pointers (MITKRB5-SA-2009- 002: CVE-2009-0846). - 13. By Kees Cook
-
* SECURITY UPDATE: arbitrary code execution via freed pointer and memory
overflows.
* src/kdc/{kerberos_ v4,dispatch, network} .c: backported upstream fixes
patched inline (MITKRB5-SA-2008- 001: CVE-2008-0062, CVE-2008-0063).
* src/lib/rpc/{svc, svc_tcp} .c: upstream fixed patched inline
(MITKRB5-SA-2008- 002: CVE-2008-0947) - 12. By Kees Cook
-
* SECURITY UPDATE: 32 byte stack overflow in rpcsec_gss.
* src/lib/rpc/svc_ auth_gss. c: new upstream changes, patched inline.
* References
MIT-SA-2007-06
CVE-2007-4743 - 11. By Kees Cook
-
* SECURITY UPDATE: stack overflow in rpcsec_gss.
* src/lib/rpc/svc_ auth_gss. c: upstream changes patched inline.
* References
MIT-SA-2007-06
CVE-2007-3999 - 10. By Kees Cook
-
* SECURITY UPDATE: multiple remote code execution vectors.
* src/lib/rpc/svc_ auth_{gssapi, unix}.c: backported upstream fixes for
MITKRB5-SA-2007- 004 (CVE-2007-2442, CVE-2007-2443).
* src/kadmin/server/ server_ stubs.c: backported upstream fixes for
MITKRB5-SA-2007- 005 (CVE-2007-2798). - 9. By Kees Cook
-
* SECURITY UPDATE: arbitrary login via telnet, arbitrary code execution
via syslog buffer overflows, and heap corruption via GSS api.
* src/appl/telnet/ telnetd/ {state, sys_term} .c: MIT-SA-2007-1 fix from
upstream (CVE-2007-0956).
* src/lib/kadm5/logger. c: MIT-SA-2007-2 fix from Debian, based on
upstream fixes (CVE-2007-0957).
* src/lib/gssapi/ krb5/k5unseal. c: MIT-SA-2007-3 fix from upstream
(CVE-2007-1216).
* References
http://web.mit. edu/kerberos/ www/advisories/ MITKRB5- SA-2007- 001-telnetd. txt
http://web.mit. edu/kerberos/ www/advisories/ MITKRB5- SA-2007- 002-syslog. txt
http://web.mit. edu/kerberos/ www/advisories/ MITKRB5- SA-2007- 003.txt - 8. By Martin Pitt
-
* SECURITY UPDATE: Remote privilege escalation.
* src/lib/rpc/svc.c:
- Do not call an uninitialized pointer.
- Patch provided by upstream.
- References:
CVE-2006-6143
http://web.mit. edu/kerberos/ www/advisories/ MITKRB5- SA-2006- 002-rpc. txt
Branch metadata
- Branch format:
- Branch format 7
- Repository format:
- Bazaar repository format 2a (needs bzr 1.16 or later)
- Stacked on:
- lp:ubuntu/lucid/krb5