ArchLinux: 201710-8: krb5: multiple issues
Summary
- CVE-2017-11368 (denial of service)
A denial of service flaw was found in MIT Kerberos krb5kdc service. An
authenticated attacker could use this flaw to cause krb5kdc to exit
with an assertion failure by making an invalid S4U2Self or S4U2Proxy
request.
- CVE-2017-11462 (arbitrary code execution)
A double free vulnerability has been discovered in MIT Kerberos 5 (aka
krb5) allowing attackers to crash the application or possibly execute
arbitrary code via vectors involving automatic deletion of security
contexts on error.
Resolution
Upgrade to 1.15.2-1.
# pacman -Syu "krb5>=1.15.2-1"
The problems have been fixed upstream in version 1.15.2.
References
https://web.mit.edu/kerberos/krb5-1.15/ https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970 http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598 https://bugzilla.redhat.com/show_bug.cgi?id=1488873 https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf https://security.archlinux.org/CVE-2017-11368 https://security.archlinux.org/CVE-2017-11462
Workaround
None.