-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: gssntlmssp security update
Advisory ID:       RHSA-2023:3097-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:3097
Issue date:        2023-05-16
CVE Names:         CVE-2023-25563 CVE-2023-25564 CVE-2023-25565 
                   CVE-2023-25566 CVE-2023-25567 
====================================================================
1. Summary:

An update for gssntlmssp is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

The gssntlmssp is a GSSAPI NTLM mechanism that allows to perform NTLM
authentication in GSSAPI programs.

Security Fix(es):

* gssntlmssp: multiple out-of-bounds read when decoding NTLM fields
(CVE-2023-25563)

* gssntlmssp: memory corruption when decoding UTF16 strings
(CVE-2023-25564)

* gssntlmssp: incorrect free when decoding target information
(CVE-2023-25565)

* gssntlmssp: memory leak when parsing usernames (CVE-2023-25566)

* gssntlmssp: out-of-bounds read when decoding target information
(CVE-2023-25567)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

2172019 - CVE-2023-25563 gssntlmssp: multiple out-of-bounds read when decoding NTLM fields
2172020 - CVE-2023-25564 gssntlmssp: memory corruption when decoding UTF16 strings
2172021 - CVE-2023-25565 gssntlmssp: incorrect free when decoding target information
2172022 - CVE-2023-25566 gssntlmssp: memory leak when parsing usernames
2172023 - CVE-2023-25567 gssntlmssp: out-of-bounds read when decoding target information

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
gssntlmssp-1.2.0-1.el8_8.src.rpm

aarch64:
gssntlmssp-1.2.0-1.el8_8.aarch64.rpm
gssntlmssp-debuginfo-1.2.0-1.el8_8.aarch64.rpm
gssntlmssp-debugsource-1.2.0-1.el8_8.aarch64.rpm

ppc64le:
gssntlmssp-1.2.0-1.el8_8.ppc64le.rpm
gssntlmssp-debuginfo-1.2.0-1.el8_8.ppc64le.rpm
gssntlmssp-debugsource-1.2.0-1.el8_8.ppc64le.rpm

s390x:
gssntlmssp-1.2.0-1.el8_8.s390x.rpm
gssntlmssp-debuginfo-1.2.0-1.el8_8.s390x.rpm
gssntlmssp-debugsource-1.2.0-1.el8_8.s390x.rpm

x86_64:
gssntlmssp-1.2.0-1.el8_8.x86_64.rpm
gssntlmssp-debuginfo-1.2.0-1.el8_8.x86_64.rpm
gssntlmssp-debugsource-1.2.0-1.el8_8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2023-25563
https://access.redhat.com/security/cve/CVE-2023-25564
https://access.redhat.com/security/cve/CVE-2023-25565
https://access.redhat.com/security/cve/CVE-2023-25566
https://access.redhat.com/security/cve/CVE-2023-25567
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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EfT0
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-3097:01 Moderate: gssntlmssp security update

An update for gssntlmssp is now available for Red Hat Enterprise Linux 8

Summary

The gssntlmssp is a GSSAPI NTLM mechanism that allows to perform NTLM authentication in GSSAPI programs.
Security Fix(es):
* gssntlmssp: multiple out-of-bounds read when decoding NTLM fields (CVE-2023-25563)
* gssntlmssp: memory corruption when decoding UTF16 strings (CVE-2023-25564)
* gssntlmssp: incorrect free when decoding target information (CVE-2023-25565)
* gssntlmssp: memory leak when parsing usernames (CVE-2023-25566)
* gssntlmssp: out-of-bounds read when decoding target information (CVE-2023-25567)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2023-25563 https://access.redhat.com/security/cve/CVE-2023-25564 https://access.redhat.com/security/cve/CVE-2023-25565 https://access.redhat.com/security/cve/CVE-2023-25566 https://access.redhat.com/security/cve/CVE-2023-25567 https://access.redhat.com/security/updates/classification/#moderate

Package List

Red Hat Enterprise Linux AppStream (v. 8):
Source: gssntlmssp-1.2.0-1.el8_8.src.rpm
aarch64: gssntlmssp-1.2.0-1.el8_8.aarch64.rpm gssntlmssp-debuginfo-1.2.0-1.el8_8.aarch64.rpm gssntlmssp-debugsource-1.2.0-1.el8_8.aarch64.rpm
ppc64le: gssntlmssp-1.2.0-1.el8_8.ppc64le.rpm gssntlmssp-debuginfo-1.2.0-1.el8_8.ppc64le.rpm gssntlmssp-debugsource-1.2.0-1.el8_8.ppc64le.rpm
s390x: gssntlmssp-1.2.0-1.el8_8.s390x.rpm gssntlmssp-debuginfo-1.2.0-1.el8_8.s390x.rpm gssntlmssp-debugsource-1.2.0-1.el8_8.s390x.rpm
x86_64: gssntlmssp-1.2.0-1.el8_8.x86_64.rpm gssntlmssp-debuginfo-1.2.0-1.el8_8.x86_64.rpm gssntlmssp-debugsource-1.2.0-1.el8_8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2023:3097-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2023:3097
Issued Date: : 2023-05-16
CVE Names: CVE-2023-25563 CVE-2023-25564 CVE-2023-25565 CVE-2023-25566 CVE-2023-25567

Topic

An update for gssntlmssp is now available for Red Hat Enterprise Linux 8.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64


Bugs Fixed

2172019 - CVE-2023-25563 gssntlmssp: multiple out-of-bounds read when decoding NTLM fields

2172020 - CVE-2023-25564 gssntlmssp: memory corruption when decoding UTF16 strings

2172021 - CVE-2023-25565 gssntlmssp: incorrect free when decoding target information

2172022 - CVE-2023-25566 gssntlmssp: memory leak when parsing usernames

2172023 - CVE-2023-25567 gssntlmssp: out-of-bounds read when decoding target information


Related News